builder: mozilla-aurora_win8_64-debug_test-web-platform-tests-9
slave: t-w864-ix-225
starttime: 1483651215.77
results: success (0)
buildid: 20170105122013
builduid: e19f4f90c178470ca462574bc9f76c8e
revision: dbbbc4ab2f1bd1e37ebbc45cdedf291074717da0
========= Started set props: master (results: 0, elapsed: 0 secs) (at 2017-01-05 13:20:15.769680) =========
master: http://buildbot-master126.bb.releng.scl3.mozilla.com:8201/
========= Finished set props: master (results: 0, elapsed: 0 secs) (at 2017-01-05 13:20:15.770853) =========
========= Started downloading to buildprops.json (results: 0, elapsed: 0 secs) (at 2017-01-05 13:20:15.771551) =========
========= Finished downloading to buildprops.json (results: 0, elapsed: 0 secs) (at 2017-01-05 13:20:15.955891) =========
========= Started 'bash -c ...' (results: 0, elapsed: 1 secs) (at 2017-01-05 13:20:15.956281) =========
'bash' '-c' 'wget -Oarchiver_client.py --no-check-certificate --tries=10 --waitretry=3 https://hg.mozilla.org/build/tools/raw-file/default/buildfarm/utils/archiver_client.py'
in dir C:\slave\test\. (timeout 1200 secs)
watching logfiles {}
argv: ['bash', '-c', 'wget -Oarchiver_client.py --no-check-certificate --tries=10 --waitretry=3 https://hg.mozilla.org/build/tools/raw-file/default/buildfarm/utils/archiver_client.py']
environment:
ALLUSERSPROFILE=C:\ProgramData
APPDATA=C:\Users\cltbld.T-W864-IX-225\AppData\Roaming
COMMONPROGRAMFILES=C:\Program Files (x86)\Common Files
COMMONPROGRAMFILES(X86)=C:\Program Files (x86)\Common Files
COMMONPROGRAMW6432=C:\Program Files\Common Files
COMPUTERNAME=T-W864-IX-225
COMSPEC=C:\windows\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
FP_NO_HOST_CHECK=NO
HOMEDRIVE=C:
HOMEPATH=\Users\cltbld.T-W864-IX-225
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LOCALAPPDATA=C:\Users\cltbld.T-W864-IX-225\AppData\Local
LOGONSERVER=\\T-W864-IX-225
MONDIR=C:\Monitor_config\
MOZBUILDDIR=C:\mozilla-build\
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
OURDRIVE=C:
PATH=C:\Program Files (x86)\NVIDIA Corporation\PhysX\Common;C:\windows\system32;C:\windows;C:\windows\System32\Wbem;C:\windows\System32\WindowsPowerShell\v1.0\;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_ARCHITEW6432=AMD64
PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 30 Stepping 5, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=1e05
PROGRAMDATA=C:\ProgramData
PROGRAMFILES=C:\Program Files (x86)
PROGRAMFILES(X86)=C:\Program Files (x86)
PROGRAMW6432=C:\Program Files
PROMPT=$P$G
PSMODULEPATH=C:\windows\system32\WindowsPowerShell\v1.0\Modules\
PUBLIC=C:\Users\Public
PWD=C:\slave\test
RUNLOGFILE=C:\slave\\runslave.log
SLAVEDIR=C:\slave\
SYSTEMDRIVE=C:
SYSTEMROOT=C:\windows
TEMP=C:\Users\CLTBLD~1.T-W\AppData\Local\Temp
TEST1=testie
TMP=C:\Users\CLTBLD~1.T-W\AppData\Local\Temp
USERDOMAIN=T-W864-IX-225
USERDOMAIN_ROAMINGPROFILE=T-W864-IX-225
USERNAME=cltbld
USERPROFILE=C:\Users\cltbld.T-W864-IX-225
WINDIR=C:\windows
using PTY: False
--13:20:17-- https://hg.mozilla.org/build/tools/raw-file/default/buildfarm/utils/archiver_client.py
=> `archiver_client.py'
Resolving hg.mozilla.org... 63.245.215.25, 63.245.215.102
Connecting to hg.mozilla.org|63.245.215.25|:443... connected.
WARNING: Certificate verification error for hg.mozilla.org: certificate signature failure
HTTP request sent, awaiting response... 200 Script output follows
Length: 12,179 (12K) [text/x-python]
0K .......... . 100% 27.13 MB/s
13:20:17 (27.13 MB/s) - `archiver_client.py' saved [12179/12179]
program finished with exit code 0
elapsedTime=1.291000
========= master_lag: 0.05 =========
========= Finished 'bash -c ...' (results: 0, elapsed: 1 secs) (at 2017-01-05 13:20:17.298672) =========
========= Started 'rm -rf ...' (results: 0, elapsed: 3 secs) (at 2017-01-05 13:20:17.299503) =========
'rm' '-rf' 'scripts' 'properties'
in dir C:\slave\test\. (timeout 1200 secs)
watching logfiles {}
argv: ['rm', '-rf', 'scripts', 'properties']
environment:
ALLUSERSPROFILE=C:\ProgramData
APPDATA=C:\Users\cltbld.T-W864-IX-225\AppData\Roaming
COMMONPROGRAMFILES=C:\Program Files (x86)\Common Files
COMMONPROGRAMFILES(X86)=C:\Program Files (x86)\Common Files
COMMONPROGRAMW6432=C:\Program Files\Common Files
COMPUTERNAME=T-W864-IX-225
COMSPEC=C:\windows\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
FP_NO_HOST_CHECK=NO
HOMEDRIVE=C:
HOMEPATH=\Users\cltbld.T-W864-IX-225
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LOCALAPPDATA=C:\Users\cltbld.T-W864-IX-225\AppData\Local
LOGONSERVER=\\T-W864-IX-225
MONDIR=C:\Monitor_config\
MOZBUILDDIR=C:\mozilla-build\
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
OURDRIVE=C:
PATH=C:\Program Files (x86)\NVIDIA Corporation\PhysX\Common;C:\windows\system32;C:\windows;C:\windows\System32\Wbem;C:\windows\System32\WindowsPowerShell\v1.0\;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_ARCHITEW6432=AMD64
PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 30 Stepping 5, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=1e05
PROGRAMDATA=C:\ProgramData
PROGRAMFILES=C:\Program Files (x86)
PROGRAMFILES(X86)=C:\Program Files (x86)
PROGRAMW6432=C:\Program Files
PROMPT=$P$G
PSMODULEPATH=C:\windows\system32\WindowsPowerShell\v1.0\Modules\
PUBLIC=C:\Users\Public
PWD=C:\slave\test
RUNLOGFILE=C:\slave\\runslave.log
SLAVEDIR=C:\slave\
SYSTEMDRIVE=C:
SYSTEMROOT=C:\windows
TEMP=C:\Users\CLTBLD~1.T-W\AppData\Local\Temp
TEST1=testie
TMP=C:\Users\CLTBLD~1.T-W\AppData\Local\Temp
USERDOMAIN=T-W864-IX-225
USERDOMAIN_ROAMINGPROFILE=T-W864-IX-225
USERNAME=cltbld
USERPROFILE=C:\Users\cltbld.T-W864-IX-225
WINDIR=C:\windows
using PTY: False
program finished with exit code 0
elapsedTime=3.412000
========= master_lag: 0.03 =========
========= Finished 'rm -rf ...' (results: 0, elapsed: 3 secs) (at 2017-01-05 13:20:20.742101) =========
========= Started 'bash -c ...' (results: 0, elapsed: 1 secs) (at 2017-01-05 13:20:20.742526) =========
'bash' '-c' u'python archiver_client.py mozharness --repo releases/mozilla-aurora --rev dbbbc4ab2f1bd1e37ebbc45cdedf291074717da0 --destination scripts --debug'
in dir C:\slave\test\. (timeout 1200 secs)
watching logfiles {}
argv: ['bash', '-c', u'python archiver_client.py mozharness --repo releases/mozilla-aurora --rev dbbbc4ab2f1bd1e37ebbc45cdedf291074717da0 --destination scripts --debug']
environment:
ALLUSERSPROFILE=C:\ProgramData
APPDATA=C:\Users\cltbld.T-W864-IX-225\AppData\Roaming
COMMONPROGRAMFILES=C:\Program Files (x86)\Common Files
COMMONPROGRAMFILES(X86)=C:\Program Files (x86)\Common Files
COMMONPROGRAMW6432=C:\Program Files\Common Files
COMPUTERNAME=T-W864-IX-225
COMSPEC=C:\windows\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
FP_NO_HOST_CHECK=NO
HOMEDRIVE=C:
HOMEPATH=\Users\cltbld.T-W864-IX-225
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LOCALAPPDATA=C:\Users\cltbld.T-W864-IX-225\AppData\Local
LOGONSERVER=\\T-W864-IX-225
MONDIR=C:\Monitor_config\
MOZBUILDDIR=C:\mozilla-build\
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
OURDRIVE=C:
PATH=C:\Program Files (x86)\NVIDIA Corporation\PhysX\Common;C:\windows\system32;C:\windows;C:\windows\System32\Wbem;C:\windows\System32\WindowsPowerShell\v1.0\;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_ARCHITEW6432=AMD64
PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 30 Stepping 5, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=1e05
PROGRAMDATA=C:\ProgramData
PROGRAMFILES=C:\Program Files (x86)
PROGRAMFILES(X86)=C:\Program Files (x86)
PROGRAMW6432=C:\Program Files
PROMPT=$P$G
PSMODULEPATH=C:\windows\system32\WindowsPowerShell\v1.0\Modules\
PUBLIC=C:\Users\Public
PWD=C:\slave\test
RUNLOGFILE=C:\slave\\runslave.log
SLAVEDIR=C:\slave\
SYSTEMDRIVE=C:
SYSTEMROOT=C:\windows
TEMP=C:\Users\CLTBLD~1.T-W\AppData\Local\Temp
TEST1=testie
TMP=C:\Users\CLTBLD~1.T-W\AppData\Local\Temp
USERDOMAIN=T-W864-IX-225
USERDOMAIN_ROAMINGPROFILE=T-W864-IX-225
USERNAME=cltbld
USERPROFILE=C:\Users\cltbld.T-W864-IX-225
WINDIR=C:\windows
using PTY: False
2017-01-05 13:20:21,572 truncating revision to first 12 chars
2017-01-05 13:20:21,572 Setting DEBUG logging.
2017-01-05 13:20:21,572 attempt 1/10
2017-01-05 13:20:21,572 Getting archive location from https://api.pub.build.mozilla.org/archiver/hgmo/releases/mozilla-aurora/dbbbc4ab2f1b?&preferred_region=us-west-2&suffix=tar.gz&subdir=testing/mozharness
2017-01-05 13:20:22,453 unpacking tar archive at: mozilla-aurora-dbbbc4ab2f1b/testing/mozharness/
2017-01-05 13:20:22,555 skipping symlink on windows: configs/single_locale/linux32.py
program finished with exit code 0
elapsedTime=1.575000
========= master_lag: 0.08 =========
========= Finished 'bash -c ...' (results: 0, elapsed: 1 secs) (at 2017-01-05 13:20:22.402502) =========
========= Started set props: script_repo_revision (results: 0, elapsed: 0 secs) (at 2017-01-05 13:20:22.403141) =========
script_repo_revision: dbbbc4ab2f1bd1e37ebbc45cdedf291074717da0
========= Finished set props: script_repo_revision (results: 0, elapsed: 0 secs) (at 2017-01-05 13:20:22.403944) =========
========= Started downloading to oauth.txt (results: 0, elapsed: 0 secs) (at 2017-01-05 13:20:22.404455) =========
========= Finished downloading to oauth.txt (results: 0, elapsed: 0 secs) (at 2017-01-05 13:20:22.428161) =========
========= Started 'c:/mozilla-build/python27/python -u ...' (results: 0, elapsed: 1 hrs, 3 mins, 11 secs) (at 2017-01-05 13:20:22.428615) =========
'c:/mozilla-build/python27/python' '-u' 'scripts/scripts/web_platform_tests.py' '--cfg' 'web_platform_tests/prod_config_windows.py' '--test-type=testharness' '--total-chunks' '10' '--this-chunk' '9' '--blob-upload-branch' 'mozilla-aurora' '--download-symbols' 'true'
in dir C:\slave\test\. (timeout 1800 secs) (maxTime 7200 secs)
watching logfiles {}
argv: ['c:/mozilla-build/python27/python', '-u', 'scripts/scripts/web_platform_tests.py', '--cfg', 'web_platform_tests/prod_config_windows.py', '--test-type=testharness', '--total-chunks', '10', '--this-chunk', '9', '--blob-upload-branch', 'mozilla-aurora', '--download-symbols', 'true']
environment:
ALLUSERSPROFILE=C:\ProgramData
APPDATA=C:\Users\cltbld.T-W864-IX-225\AppData\Roaming
COMMONPROGRAMFILES=C:\Program Files (x86)\Common Files
COMMONPROGRAMFILES(X86)=C:\Program Files (x86)\Common Files
COMMONPROGRAMW6432=C:\Program Files\Common Files
COMPUTERNAME=T-W864-IX-225
COMSPEC=C:\windows\system32\cmd.exe
DCLOCATION=SCL3
DNSSUFFIX=wintest.releng.scl3.mozilla.com
FP_NO_HOST_CHECK=NO
HOMEDRIVE=C:
HOMEPATH=\Users\cltbld.T-W864-IX-225
KTS_HOME=C:\Program Files\KTS
KTS_VERSION=1.19c
LOCALAPPDATA=C:\Users\cltbld.T-W864-IX-225\AppData\Local
LOGONSERVER=\\T-W864-IX-225
MONDIR=C:\Monitor_config\
MOZBUILDDIR=C:\mozilla-build\
MOZ_CRASHREPORTER_NO_REPORT=1
MOZ_HIDE_RESULTS_TABLE=1
MOZ_NO_REMOTE=1
NO_EM_RESTART=1
NO_FAIL_ON_TEST_ERRORS=1
NUMBER_OF_PROCESSORS=8
OS=Windows_NT
OURDRIVE=C:
PATH=C:\Program Files (x86)\NVIDIA Corporation\PhysX\Common;C:\windows\system32;C:\windows;C:\windows\System32\Wbem;C:\windows\System32\WindowsPowerShell\v1.0\;C:\mozilla-build\python27;C:\mozilla-build\python27\Scripts;C:\mozilla-build\msys\bin;C:\mozilla-build\vim\vim72;C:\mozilla-build\wget;C:\mozilla-build\info-zip;C:\CoreUtils\bin;C:\mozilla-build\buildbotve\scripts;C:\mozilla-build\hg
PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
PROCESSOR_ARCHITECTURE=x86
PROCESSOR_ARCHITEW6432=AMD64
PROCESSOR_IDENTIFIER=Intel64 Family 6 Model 30 Stepping 5, GenuineIntel
PROCESSOR_LEVEL=6
PROCESSOR_REVISION=1e05
PROGRAMDATA=C:\ProgramData
PROGRAMFILES=C:\Program Files (x86)
PROGRAMFILES(X86)=C:\Program Files (x86)
PROGRAMW6432=C:\Program Files
PROMPT=$P$G
PROPERTIES_FILE=C:\slave\test/buildprops.json
PSMODULEPATH=C:\windows\system32\WindowsPowerShell\v1.0\Modules\
PUBLIC=C:\Users\Public
PWD=C:\slave\test
RUNLOGFILE=C:\slave\\runslave.log
SLAVEDIR=C:\slave\
SYSTEMDRIVE=C:
SYSTEMROOT=C:\windows
TEMP=C:\Users\CLTBLD~1.T-W\AppData\Local\Temp
TEST1=testie
TMP=C:\Users\CLTBLD~1.T-W\AppData\Local\Temp
USERDOMAIN=T-W864-IX-225
USERDOMAIN_ROAMINGPROFILE=T-W864-IX-225
USERNAME=cltbld
USERPROFILE=C:\Users\cltbld.T-W864-IX-225
WINDIR=C:\windows
XPCOM_DEBUG_BREAK=warn
using PTY: False
13:20:23 INFO - MultiFileLogger online at 20170105 13:20:23 in C:\slave\test
13:20:23 INFO - Run as scripts/scripts/web_platform_tests.py --cfg web_platform_tests/prod_config_windows.py --test-type=testharness --total-chunks 10 --this-chunk 9 --blob-upload-branch mozilla-aurora --download-symbols true
13:20:23 INFO - Dumping config to C:\slave\test\logs\localconfig.json.
13:20:23 INFO - {'allow_software_gl_layers': False,
13:20:23 INFO - 'append_to_log': False,
13:20:23 INFO - 'base_work_dir': 'C:\\slave\\test',
13:20:23 INFO - 'blob_upload_branch': 'mozilla-aurora',
13:20:23 INFO - 'blob_uploader_auth_file': 'C:\\slave\\test\\oauth.txt',
13:20:23 INFO - 'buildbot_json_path': 'buildprops.json',
13:20:23 INFO - 'config_files': ('web_platform_tests/prod_config_windows.py',),
13:20:23 INFO - 'default_blob_upload_servers': ('https://blobupload.elasticbeanstalk.com',),
13:20:23 INFO - 'download_minidump_stackwalk': True,
13:20:23 INFO - 'download_symbols': 'true',
13:20:23 INFO - 'e10s': False,
13:20:23 INFO - 'exes': {'hg': 'c:/mozilla-build/hg/hg',
13:20:23 INFO - 'mozinstall': ('C:\\slave\\test/build/venv/scripts/python',
13:20:23 INFO - 'C:\\slave\\test/build/venv/scripts/mozinstall-script.py'),
13:20:23 INFO - 'python': 'c:\\mozilla-build\\python27\\python.exe',
13:20:23 INFO - 'tooltool.py': ('c:\\mozilla-build\\python27\\python.exe',
13:20:23 INFO - 'C:/mozilla-build/tooltool.py'),
13:20:23 INFO - 'virtualenv': ('c:\\mozilla-build\\python27\\python.exe',
13:20:23 INFO - 'c:/mozilla-build/buildbotve/virtualenv.py')},
13:20:23 INFO - 'find_links': ('http://pypi.pvt.build.mozilla.org/pub',
13:20:23 INFO - 'http://pypi.pub.build.mozilla.org/pub'),
13:20:23 INFO - 'log_level': 'info',
13:20:23 INFO - 'log_to_console': True,
13:20:23 INFO - 'opt_config_files': (),
13:20:23 INFO - 'options': ('--prefs-root=%(test_path)s/prefs',
13:20:23 INFO - '--processes=1',
13:20:23 INFO - '--config=%(test_path)s/wptrunner.ini',
13:20:23 INFO - '--ca-cert-path=%(test_path)s/certs/cacert.pem',
13:20:23 INFO - '--host-key-path=%(test_path)s/certs/web-platform.test.key',
13:20:23 INFO - '--host-cert-path=%(test_path)s/certs/web-platform.test.pem',
13:20:23 INFO - '--certutil-binary=%(test_install_path)s/bin/certutil'),
13:20:23 INFO - 'pip_index': False,
13:20:23 INFO - 'require_test_zip': True,
13:20:23 INFO - 'test_type': ('testharness',),
13:20:23 INFO - 'this_chunk': '9',
13:20:23 INFO - 'total_chunks': '10',
13:20:23 INFO - 'virtualenv_path': 'venv',
13:20:23 INFO - 'volatile_config': {'actions': None, 'add_actions': None, 'no_actions': None},
13:20:23 INFO - 'work_dir': 'build'}
13:20:23 INFO - [mozharness: 2017-01-05 21:20:23.282000Z] Running clobber step.
13:20:23 INFO - Running pre-action listener: _resource_record_pre_action
13:20:23 INFO - Running main action method: clobber
13:20:23 INFO - rmtree: C:\slave\test\build
13:20:23 INFO - Using _rmtree_windows ...
13:20:23 INFO - retry: Calling _rmtree_windows with args: ('C:\\slave\\test\\build',), kwargs: {}, attempt #1
13:21:59 INFO - Running post-action listener: _resource_record_post_action
13:21:59 INFO - [mozharness: 2017-01-05 21:21:59.346000Z] Finished clobber step (success)
13:21:59 INFO - [mozharness: 2017-01-05 21:21:59.346000Z] Running read-buildbot-config step.
13:21:59 INFO - Running pre-action listener: _resource_record_pre_action
13:21:59 INFO - Running main action method: read_buildbot_config
13:21:59 INFO - Using buildbot properties:
13:21:59 INFO - {
13:21:59 INFO - "project": "",
13:21:59 INFO - "product": "firefox",
13:21:59 INFO - "script_repo_revision": "production",
13:21:59 INFO - "scheduler": "tests-mozilla-aurora-win8_64-debug-unittest",
13:21:59 INFO - "repository": "",
13:21:59 INFO - "buildername": "Windows 8 64-bit mozilla-aurora debug test web-platform-tests-9",
13:21:59 INFO - "buildid": "20170105122013",
13:21:59 INFO - "pgo_build": "False",
13:21:59 INFO - "basedir": "C:\\slave\\test",
13:21:59 INFO - "buildnumber": 27,
13:21:59 INFO - "slavename": "t-w864-ix-225",
13:21:59 INFO - "revision": "dbbbc4ab2f1bd1e37ebbc45cdedf291074717da0",
13:21:59 INFO - "master": "http://buildbot-master126.bb.releng.scl3.mozilla.com:8201/",
13:21:59 INFO - "platform": "win64",
13:21:59 INFO - "branch": "mozilla-aurora",
13:21:59 INFO - "repo_path": "releases/mozilla-aurora",
13:21:59 INFO - "moz_repo_path": "",
13:21:59 INFO - "stage_platform": "win64",
13:21:59 INFO - "builduid": "e19f4f90c178470ca462574bc9f76c8e",
13:21:59 INFO - "slavebuilddir": "test"
13:21:59 INFO - }
13:21:59 INFO - Found a test packages url https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.test_packages.json.
13:21:59 INFO - Found installer url https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.zip.
13:21:59 INFO - Running post-action listener: _resource_record_post_action
13:21:59 INFO - [mozharness: 2017-01-05 21:21:59.349000Z] Finished read-buildbot-config step (success)
13:21:59 INFO - [mozharness: 2017-01-05 21:21:59.349000Z] Running download-and-extract step.
13:21:59 INFO - Running pre-action listener: _resource_record_pre_action
13:21:59 INFO - Running main action method: download_and_extract
13:21:59 INFO - mkdir: C:\slave\test\build\tests
13:21:59 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
13:21:59 INFO - trying https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.test_packages.json
13:21:59 INFO - Downloading https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.test_packages.json to C:\slave\test\build\firefox-52.0a2.en-US.win64.test_packages.json
13:21:59 INFO - retry: Calling _download_file with args: (), kwargs: {'url': 'https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.test_packages.json', 'file_name': 'C:\\slave\\test\\build\\firefox-52.0a2.en-US.win64.test_packages.json'}, attempt #1
13:22:00 INFO - Downloaded 1274 bytes.
13:22:00 INFO - Reading from file C:\slave\test\build\firefox-52.0a2.en-US.win64.test_packages.json
13:22:00 INFO - Using the following test package requirements:
13:22:00 INFO - {u'common': [u'firefox-52.0a2.en-US.win64.common.tests.zip'],
13:22:00 INFO - u'cppunittest': [u'firefox-52.0a2.en-US.win64.common.tests.zip',
13:22:00 INFO - u'firefox-52.0a2.en-US.win64.cppunittest.tests.zip'],
13:22:00 INFO - u'gtest': [u'firefox-52.0a2.en-US.win64.common.tests.zip',
13:22:00 INFO - u'firefox-52.0a2.en-US.win64.gtest.tests.zip'],
13:22:00 INFO - u'jittest': [u'firefox-52.0a2.en-US.win64.common.tests.zip',
13:22:00 INFO - u'jsshell-win64.zip'],
13:22:00 INFO - u'mochitest': [u'firefox-52.0a2.en-US.win64.common.tests.zip',
13:22:00 INFO - u'firefox-52.0a2.en-US.win64.mochitest.tests.zip'],
13:22:00 INFO - u'mozbase': [u'firefox-52.0a2.en-US.win64.common.tests.zip'],
13:22:00 INFO - u'reftest': [u'firefox-52.0a2.en-US.win64.common.tests.zip',
13:22:00 INFO - u'firefox-52.0a2.en-US.win64.reftest.tests.zip'],
13:22:00 INFO - u'talos': [u'firefox-52.0a2.en-US.win64.common.tests.zip',
13:22:00 INFO - u'firefox-52.0a2.en-US.win64.talos.tests.zip'],
13:22:00 INFO - u'web-platform': [u'firefox-52.0a2.en-US.win64.common.tests.zip',
13:22:00 INFO - u'firefox-52.0a2.en-US.win64.web-platform.tests.zip'],
13:22:00 INFO - u'xpcshell': [u'firefox-52.0a2.en-US.win64.common.tests.zip',
13:22:00 INFO - u'firefox-52.0a2.en-US.win64.xpcshell.tests.zip']}
13:22:00 INFO - Downloading packages: [u'firefox-52.0a2.en-US.win64.common.tests.zip', u'firefox-52.0a2.en-US.win64.web-platform.tests.zip'] for test suite category: web-platform
13:22:00 INFO - Downloading and extracting to C:\slave\test\build\tests these dirs bin/*, config/*, mozbase/*, marionette/*, tools/wptserve/*, web-platform/* from https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.common.tests.zip
13:22:00 INFO - retry: Calling fetch_url_into_memory with args: (), kwargs: {'url': u'https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.common.tests.zip'}, attempt #1
13:22:00 INFO - Fetch https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.common.tests.zip into memory
13:22:00 INFO - Http code: 200
13:22:00 INFO - via: 1.1 0302e8c462515ae281b72d9c815a5698.cloudfront.net (CloudFront)
13:22:00 INFO - x-amz-cf-id: I0n_8v6SCKCBlsZ4GnAxFUb9p0Dz3f6vHq-_hlWPjnjFKeV1vhsVnw==
13:22:00 INFO - x-amz-version-id: 6IOueMc_BSPEZ9dj5NOML.i_xieBetMx
13:22:01 INFO - Expected file size: 19500090
13:22:01 INFO - Obtained file size: 19500090
13:22:02 INFO - Downloading and extracting to C:\slave\test\build\tests these dirs bin/*, config/*, mozbase/*, marionette/*, tools/wptserve/*, web-platform/* from https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.web-platform.tests.zip
13:22:02 INFO - retry: Calling fetch_url_into_memory with args: (), kwargs: {'url': u'https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.web-platform.tests.zip'}, attempt #1
13:22:02 INFO - Fetch https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.web-platform.tests.zip into memory
13:22:02 INFO - Http code: 200
13:22:02 INFO - via: 1.1 8008015354a3ca72f56c382a1d1cfe9f.cloudfront.net (CloudFront)
13:22:02 INFO - x-amz-cf-id: x84sX3wVNACu-pBCjPROQhnRUOapPXvh8QZeURcZzi9A9tgz1SUydw==
13:22:02 INFO - x-amz-version-id: X70fnK6ChCksMK5st8KB1KR2lWmVXENX
13:22:03 INFO - Expected file size: 43226659
13:22:03 INFO - Obtained file size: 43226659
13:22:44 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
13:22:44 INFO - trying https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.zip
13:22:44 INFO - Downloading https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.zip to C:\slave\test\build\firefox-52.0a2.en-US.win64.zip
13:22:44 INFO - retry: Calling _download_file with args: (), kwargs: {'url': 'https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.zip', 'file_name': 'C:\\slave\\test\\build\\firefox-52.0a2.en-US.win64.zip'}, attempt #1
13:22:46 INFO - Downloaded 80353553 bytes.
13:22:46 INFO - Setting buildbot property build_url to https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.zip
13:22:46 INFO - mkdir: C:\slave\test\properties
13:22:46 INFO - Writing buildbot properties ['build_url'] to C:\slave\test\properties\build_url
13:22:46 INFO - Writing to file C:\slave\test\properties\build_url
13:22:46 INFO - Contents:
13:22:46 INFO - build_url:https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.zip
13:22:46 INFO - retry: Calling query_symbols_url with args: (), kwargs: {}, attempt #1
13:22:46 INFO - Setting buildbot property symbols_url to https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.crashreporter-symbols.zip
13:22:46 INFO - Writing buildbot properties ['symbols_url'] to C:\slave\test\properties\symbols_url
13:22:46 INFO - Writing to file C:\slave\test\properties\symbols_url
13:22:46 INFO - Contents:
13:22:46 INFO - symbols_url:https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.crashreporter-symbols.zip
13:22:46 INFO - Downloading and extracting to C:\slave\test\build\symbols these dirs * from https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.crashreporter-symbols.zip
13:22:46 INFO - retry: Calling fetch_url_into_memory with args: (), kwargs: {'url': 'https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.crashreporter-symbols.zip'}, attempt #1
13:22:46 INFO - Fetch https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.crashreporter-symbols.zip into memory
13:22:47 INFO - Http code: 200
13:22:47 INFO - via: 1.1 5ed093c37d643652e278a198e0556a40.cloudfront.net (CloudFront)
13:22:47 INFO - x-amz-cf-id: wOncZrx5rsTuk_3Y_Eu8vUgO5gvMG2AGqCwMw72NFkauz41PVOBMxQ==
13:22:47 INFO - x-amz-version-id: wCTcTFfdZVNZBjDB96OMzudKk_v.zRHb
13:22:48 INFO - Expected file size: 54714413
13:22:48 INFO - Obtained file size: 54714413
13:22:55 INFO - Running post-action listener: _resource_record_post_action
13:22:55 INFO - Running post-action listener: set_extra_try_arguments
13:22:55 INFO - [mozharness: 2017-01-05 21:22:55.437000Z] Finished download-and-extract step (success)
13:22:55 INFO - [mozharness: 2017-01-05 21:22:55.437000Z] Running fetch-geckodriver step.
13:22:55 INFO - Running pre-action listener: _resource_record_pre_action
13:22:55 INFO - Running main action method: fetch_geckodriver
13:22:55 INFO - Running post-action listener: _resource_record_post_action
13:22:55 INFO - [mozharness: 2017-01-05 21:22:55.438000Z] Finished fetch-geckodriver step (success)
13:22:55 INFO - [mozharness: 2017-01-05 21:22:55.438000Z] Running create-virtualenv step.
13:22:55 INFO - Running pre-action listener: _pre_create_virtualenv
13:22:55 INFO - Running pre-action listener: _resource_record_pre_action
13:22:55 INFO - Running main action method: create_virtualenv
13:22:55 INFO - Creating virtualenv C:\slave\test\build\venv
13:22:55 INFO - Running command: ['c:\\mozilla-build\\python27\\python.exe', 'c:/mozilla-build/buildbotve/virtualenv.py', '--no-site-packages', '--distribute', 'C:\\slave\\test\\build\\venv'] in C:\slave\test\build
13:22:55 INFO - Copy/paste: c:\mozilla-build\python27\python.exe c:/mozilla-build/buildbotve/virtualenv.py --no-site-packages --distribute C:\slave\test\build\venv
13:22:58 INFO - New python executable in C:\slave\test\build\venv\Scripts\python.exe
13:23:03 INFO - Installing distribute......................................................................................................................................................................................done.
13:23:05 INFO - Return code: 0
13:23:05 INFO - Getting output from command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', '--version']
13:23:05 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip --version
13:23:06 INFO - Reading from file tmpfile_stdout
13:23:06 INFO - Output received:
13:23:06 INFO - pip 0.8.2 from c:\slave\test\build\venv\lib\site-packages\pip-0.8.2-py2.7.egg (python 2.7)
13:23:06 INFO - Using _rmtree_windows ...
13:23:06 INFO - Using _rmtree_windows ...
13:23:06 INFO - Installing psutil>=3.1.1 into virtualenv C:\slave\test\build\venv
13:23:06 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
13:23:06 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
13:23:06 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
13:23:06 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
13:23:06 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'psutil>=3.1.1']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x025E5250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x025FA188>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x0254DFF8>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01D28DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0251C230>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x025ED520>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'TEST1': 'testie', 'COMPUTERNAME': 'T-W864-IX-225', 'USERDOMAIN': 'T-W864-IX-225', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\', 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files', 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files (x86)', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'NO_EM_RESTART': '1', 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)', 'OURDRIVE': 'C:', 'MOZ_HIDE_RESULTS_TABLE': '1', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-225', 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Local', 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-225', 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-225', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'PROGRAMW6432': 'C:\\Program Files', 'USERNAME': 'cltbld', 'LOGONSERVER': '\\\\T-W864-IX-225', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'PROGRAMDATA': 'C:\\ProgramData', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'PROMPT': '$P$G', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Roaming', 'HOMEDRIVE': 'C:', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROCESSOR_ARCHITEW6432': 'AMD64', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
13:23:06 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'psutil>=3.1.1'] in C:\slave\test\build
13:23:06 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub psutil>=3.1.1
13:23:06 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
13:23:06 INFO - 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Roaming',
13:23:06 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files',
13:23:06 INFO - 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files',
13:23:06 INFO - 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files',
13:23:06 INFO - 'COMPUTERNAME': 'T-W864-IX-225',
13:23:06 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
13:23:06 INFO - 'DCLOCATION': 'SCL3',
13:23:06 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
13:23:06 INFO - 'FP_NO_HOST_CHECK': 'NO',
13:23:06 INFO - 'HOMEDRIVE': 'C:',
13:23:06 INFO - 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-225',
13:23:06 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
13:23:06 INFO - 'KTS_VERSION': '1.19c',
13:23:06 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Local',
13:23:06 INFO - 'LOGONSERVER': '\\\\T-W864-IX-225',
13:23:06 INFO - 'MONDIR': 'C:\\Monitor_config\\',
13:23:06 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
13:23:06 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
13:23:06 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
13:23:06 INFO - 'MOZ_NO_REMOTE': '1',
13:23:06 INFO - 'NO_EM_RESTART': '1',
13:23:06 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
13:23:06 INFO - 'NUMBER_OF_PROCESSORS': '8',
13:23:06 INFO - 'OS': 'Windows_NT',
13:23:06 INFO - 'OURDRIVE': 'C:',
13:23:06 INFO - 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
13:23:06 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
13:23:06 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
13:23:06 INFO - 'PROCESSOR_ARCHITEW6432': 'AMD64',
13:23:06 INFO - 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel',
13:23:06 INFO - 'PROCESSOR_LEVEL': '6',
13:23:06 INFO - 'PROCESSOR_REVISION': '1e05',
13:23:06 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
13:23:06 INFO - 'PROGRAMFILES': 'C:\\Program Files (x86)',
13:23:06 INFO - 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)',
13:23:06 INFO - 'PROGRAMW6432': 'C:\\Program Files',
13:23:06 INFO - 'PROMPT': '$P$G',
13:23:06 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
13:23:06 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\',
13:23:06 INFO - 'PUBLIC': 'C:\\Users\\Public',
13:23:06 INFO - 'PWD': 'C:\\slave\\test',
13:23:06 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
13:23:06 INFO - 'SLAVEDIR': 'C:\\slave\\',
13:23:06 INFO - 'SYSTEMDRIVE': 'C:',
13:23:06 INFO - 'SYSTEMROOT': 'C:\\windows',
13:23:06 INFO - 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
13:23:06 INFO - 'TEST1': 'testie',
13:23:06 INFO - 'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
13:23:06 INFO - 'USERDOMAIN': 'T-W864-IX-225',
13:23:06 INFO - 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-225',
13:23:06 INFO - 'USERNAME': 'cltbld',
13:23:06 INFO - 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-225',
13:23:06 INFO - 'WINDIR': 'C:\\windows',
13:23:06 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
13:23:07 INFO - Ignoring indexes: http://pypi.python.org/simple/
13:23:07 INFO - Downloading/unpacking psutil>=3.1.1
13:23:07 INFO - Running setup.py egg_info for package psutil
13:23:07 INFO - warning: no previously-included files matching '*' found under directory 'docs\_build'
13:23:07 INFO - warning: manifest_maker: MANIFEST.in, line 18: 'recursive-include' expects
...
13:23:07 INFO - Installing collected packages: psutil
13:23:07 INFO - Running setup.py install for psutil
13:23:07 INFO - building 'psutil._psutil_windows' extension
13:23:07 INFO - error: Unable to find vcvarsall.bat
13:23:07 INFO - Complete output from command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\users\cltbld~1.t-w\appdata\local\temp\pip-o5zri2-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7:
13:23:07 INFO - running install
13:23:07 INFO - running build
13:23:07 INFO - running build_py
13:23:07 INFO - creating build
13:23:07 INFO - creating build\lib.win32-2.7
13:23:07 INFO - creating build\lib.win32-2.7\psutil
13:23:07 INFO - copying psutil\_common.py -> build\lib.win32-2.7\psutil
13:23:07 INFO - copying psutil\_compat.py -> build\lib.win32-2.7\psutil
13:23:07 INFO - copying psutil\_psbsd.py -> build\lib.win32-2.7\psutil
13:23:07 INFO - copying psutil\_pslinux.py -> build\lib.win32-2.7\psutil
13:23:07 INFO - copying psutil\_psosx.py -> build\lib.win32-2.7\psutil
13:23:07 INFO - copying psutil\_psposix.py -> build\lib.win32-2.7\psutil
13:23:07 INFO - copying psutil\_pssunos.py -> build\lib.win32-2.7\psutil
13:23:07 INFO - copying psutil\_pswindows.py -> build\lib.win32-2.7\psutil
13:23:07 INFO - copying psutil\__init__.py -> build\lib.win32-2.7\psutil
13:23:07 INFO - running build_ext
13:23:07 INFO - building 'psutil._psutil_windows' extension
13:23:07 INFO - error: Unable to find vcvarsall.bat
13:23:07 INFO - ----------------------------------------
13:23:07 INFO - Command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\users\cltbld~1.t-w\appdata\local\temp\pip-o5zri2-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7 failed with error code 1
13:23:07 INFO - Storing complete log in C:\Users\cltbld.T-W864-IX-225\AppData\Roaming\pip\pip.log
13:23:07 WARNING - Return code: 1
13:23:07 WARNING - Could not install python package: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub psutil>=3.1.1 failed after 1 tries!
13:23:07 INFO - Installing mozsystemmonitor==0.3 into virtualenv C:\slave\test\build\venv
13:23:07 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
13:23:07 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
13:23:07 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
13:23:07 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
13:23:07 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'mozsystemmonitor==0.3']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x025E5250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x025FA188>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x0254DFF8>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01D28DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0251C230>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x025ED520>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'TEST1': 'testie', 'COMPUTERNAME': 'T-W864-IX-225', 'USERDOMAIN': 'T-W864-IX-225', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\', 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files', 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files (x86)', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'NO_EM_RESTART': '1', 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)', 'OURDRIVE': 'C:', 'MOZ_HIDE_RESULTS_TABLE': '1', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-225', 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Local', 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-225', 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-225', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'PROGRAMW6432': 'C:\\Program Files', 'USERNAME': 'cltbld', 'LOGONSERVER': '\\\\T-W864-IX-225', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'PROGRAMDATA': 'C:\\ProgramData', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'PROMPT': '$P$G', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Roaming', 'HOMEDRIVE': 'C:', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROCESSOR_ARCHITEW6432': 'AMD64', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
13:23:07 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'mozsystemmonitor==0.3'] in C:\slave\test\build
13:23:07 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub mozsystemmonitor==0.3
13:23:07 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
13:23:07 INFO - 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Roaming',
13:23:07 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files',
13:23:07 INFO - 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files',
13:23:07 INFO - 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files',
13:23:07 INFO - 'COMPUTERNAME': 'T-W864-IX-225',
13:23:07 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
13:23:07 INFO - 'DCLOCATION': 'SCL3',
13:23:07 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
13:23:07 INFO - 'FP_NO_HOST_CHECK': 'NO',
13:23:07 INFO - 'HOMEDRIVE': 'C:',
13:23:07 INFO - 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-225',
13:23:07 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
13:23:07 INFO - 'KTS_VERSION': '1.19c',
13:23:07 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Local',
13:23:07 INFO - 'LOGONSERVER': '\\\\T-W864-IX-225',
13:23:07 INFO - 'MONDIR': 'C:\\Monitor_config\\',
13:23:07 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
13:23:07 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
13:23:07 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
13:23:07 INFO - 'MOZ_NO_REMOTE': '1',
13:23:07 INFO - 'NO_EM_RESTART': '1',
13:23:07 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
13:23:07 INFO - 'NUMBER_OF_PROCESSORS': '8',
13:23:07 INFO - 'OS': 'Windows_NT',
13:23:07 INFO - 'OURDRIVE': 'C:',
13:23:07 INFO - 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
13:23:07 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
13:23:07 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
13:23:07 INFO - 'PROCESSOR_ARCHITEW6432': 'AMD64',
13:23:07 INFO - 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel',
13:23:07 INFO - 'PROCESSOR_LEVEL': '6',
13:23:07 INFO - 'PROCESSOR_REVISION': '1e05',
13:23:07 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
13:23:07 INFO - 'PROGRAMFILES': 'C:\\Program Files (x86)',
13:23:07 INFO - 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)',
13:23:07 INFO - 'PROGRAMW6432': 'C:\\Program Files',
13:23:07 INFO - 'PROMPT': '$P$G',
13:23:07 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
13:23:07 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\',
13:23:07 INFO - 'PUBLIC': 'C:\\Users\\Public',
13:23:07 INFO - 'PWD': 'C:\\slave\\test',
13:23:07 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
13:23:07 INFO - 'SLAVEDIR': 'C:\\slave\\',
13:23:07 INFO - 'SYSTEMDRIVE': 'C:',
13:23:07 INFO - 'SYSTEMROOT': 'C:\\windows',
13:23:07 INFO - 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
13:23:07 INFO - 'TEST1': 'testie',
13:23:07 INFO - 'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
13:23:07 INFO - 'USERDOMAIN': 'T-W864-IX-225',
13:23:07 INFO - 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-225',
13:23:07 INFO - 'USERNAME': 'cltbld',
13:23:07 INFO - 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-225',
13:23:07 INFO - 'WINDIR': 'C:\\windows',
13:23:07 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
13:23:08 INFO - Ignoring indexes: http://pypi.python.org/simple/
13:23:08 INFO - Downloading/unpacking mozsystemmonitor==0.3
13:23:08 INFO - Downloading mozsystemmonitor-0.3.tar.gz
13:23:08 INFO - Running setup.py egg_info for package mozsystemmonitor
13:23:08 INFO - Downloading/unpacking psutil>=3.1.1 (from mozsystemmonitor==0.3)
13:23:08 INFO - Running setup.py egg_info for package psutil
13:23:08 INFO - warning: no previously-included files matching '*' found under directory 'docs\_build'
13:23:08 INFO - warning: manifest_maker: MANIFEST.in, line 18: 'recursive-include' expects ...
13:23:08 INFO - Installing collected packages: mozsystemmonitor, psutil
13:23:08 INFO - Running setup.py install for mozsystemmonitor
13:23:08 INFO - Running setup.py install for psutil
13:23:08 INFO - building 'psutil._psutil_windows' extension
13:23:08 INFO - error: Unable to find vcvarsall.bat
13:23:08 INFO - Complete output from command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\users\cltbld~1.t-w\appdata\local\temp\pip-_2_4sv-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7:
13:23:08 INFO - running install
13:23:08 INFO - running build
13:23:08 INFO - running build_py
13:23:08 INFO - running build_ext
13:23:08 INFO - building 'psutil._psutil_windows' extension
13:23:08 INFO - error: Unable to find vcvarsall.bat
13:23:08 INFO - ----------------------------------------
13:23:08 INFO - Command C:\slave\test\build\venv\Scripts\python.exe -c "import setuptools;__file__='C:\\slave\\test\\build\\venv\\build\\psutil\\setup.py';execfile(__file__)" install --single-version-externally-managed --record c:\users\cltbld~1.t-w\appdata\local\temp\pip-_2_4sv-record\install-record.txt --install-headers C:\slave\test\build\venv\include\site\python2.7 failed with error code 1
13:23:08 INFO - Storing complete log in C:\Users\cltbld.T-W864-IX-225\AppData\Roaming\pip\pip.log
13:23:08 WARNING - Return code: 1
13:23:08 WARNING - Could not install python package: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub mozsystemmonitor==0.3 failed after 1 tries!
13:23:08 INFO - Installing jsonschema==2.5.1 into virtualenv C:\slave\test\build\venv
13:23:08 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
13:23:08 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
13:23:08 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
13:23:08 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
13:23:08 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'jsonschema==2.5.1']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x025E5250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x025FA188>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x0254DFF8>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01D28DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0251C230>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x025ED520>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'TEST1': 'testie', 'COMPUTERNAME': 'T-W864-IX-225', 'USERDOMAIN': 'T-W864-IX-225', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\', 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files', 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files (x86)', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'NO_EM_RESTART': '1', 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)', 'OURDRIVE': 'C:', 'MOZ_HIDE_RESULTS_TABLE': '1', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-225', 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Local', 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-225', 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-225', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'PROGRAMW6432': 'C:\\Program Files', 'USERNAME': 'cltbld', 'LOGONSERVER': '\\\\T-W864-IX-225', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'PROGRAMDATA': 'C:\\ProgramData', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'PROMPT': '$P$G', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Roaming', 'HOMEDRIVE': 'C:', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROCESSOR_ARCHITEW6432': 'AMD64', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
13:23:08 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'jsonschema==2.5.1'] in C:\slave\test\build
13:23:08 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub jsonschema==2.5.1
13:23:08 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
13:23:08 INFO - 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Roaming',
13:23:08 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files',
13:23:08 INFO - 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files',
13:23:08 INFO - 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files',
13:23:08 INFO - 'COMPUTERNAME': 'T-W864-IX-225',
13:23:08 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
13:23:08 INFO - 'DCLOCATION': 'SCL3',
13:23:08 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
13:23:08 INFO - 'FP_NO_HOST_CHECK': 'NO',
13:23:08 INFO - 'HOMEDRIVE': 'C:',
13:23:08 INFO - 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-225',
13:23:08 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
13:23:08 INFO - 'KTS_VERSION': '1.19c',
13:23:08 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Local',
13:23:08 INFO - 'LOGONSERVER': '\\\\T-W864-IX-225',
13:23:08 INFO - 'MONDIR': 'C:\\Monitor_config\\',
13:23:08 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
13:23:08 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
13:23:08 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
13:23:08 INFO - 'MOZ_NO_REMOTE': '1',
13:23:08 INFO - 'NO_EM_RESTART': '1',
13:23:08 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
13:23:08 INFO - 'NUMBER_OF_PROCESSORS': '8',
13:23:08 INFO - 'OS': 'Windows_NT',
13:23:08 INFO - 'OURDRIVE': 'C:',
13:23:08 INFO - 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
13:23:08 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
13:23:08 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
13:23:08 INFO - 'PROCESSOR_ARCHITEW6432': 'AMD64',
13:23:08 INFO - 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel',
13:23:08 INFO - 'PROCESSOR_LEVEL': '6',
13:23:08 INFO - 'PROCESSOR_REVISION': '1e05',
13:23:08 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
13:23:08 INFO - 'PROGRAMFILES': 'C:\\Program Files (x86)',
13:23:08 INFO - 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)',
13:23:08 INFO - 'PROGRAMW6432': 'C:\\Program Files',
13:23:08 INFO - 'PROMPT': '$P$G',
13:23:08 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
13:23:08 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\',
13:23:08 INFO - 'PUBLIC': 'C:\\Users\\Public',
13:23:08 INFO - 'PWD': 'C:\\slave\\test',
13:23:08 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
13:23:08 INFO - 'SLAVEDIR': 'C:\\slave\\',
13:23:08 INFO - 'SYSTEMDRIVE': 'C:',
13:23:08 INFO - 'SYSTEMROOT': 'C:\\windows',
13:23:08 INFO - 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
13:23:08 INFO - 'TEST1': 'testie',
13:23:08 INFO - 'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
13:23:08 INFO - 'USERDOMAIN': 'T-W864-IX-225',
13:23:08 INFO - 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-225',
13:23:08 INFO - 'USERNAME': 'cltbld',
13:23:08 INFO - 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-225',
13:23:08 INFO - 'WINDIR': 'C:\\windows',
13:23:08 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
13:23:08 INFO - Ignoring indexes: http://pypi.python.org/simple/
13:23:08 INFO - Downloading/unpacking jsonschema==2.5.1
13:23:11 INFO - Running setup.py egg_info for package jsonschema
13:23:11 INFO - zip_safe flag not set; analyzing archive contents...
13:23:11 INFO - install_dir .
13:23:11 INFO - Installed c:\slave\test\build\venv\build\jsonschema\vcversioner-2.16.0.0-py2.7.egg
13:23:11 INFO - Installing collected packages: jsonschema
13:23:11 INFO - Running setup.py install for jsonschema
13:23:11 INFO - Installing jsonschema-script.py script to C:\slave\test\build\venv\Scripts
13:23:11 INFO - Installing jsonschema.exe script to C:\slave\test\build\venv\Scripts
13:23:11 INFO - Successfully installed jsonschema
13:23:11 INFO - Cleaning up...
13:23:11 INFO - Return code: 0
13:23:11 INFO - Installing functools32==3.2.3-2 into virtualenv C:\slave\test\build\venv
13:23:11 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
13:23:11 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
13:23:11 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
13:23:11 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
13:23:11 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'functools32==3.2.3-2']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x025E5250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x025FA188>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x0254DFF8>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01D28DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0251C230>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x025ED520>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'TEST1': 'testie', 'COMPUTERNAME': 'T-W864-IX-225', 'USERDOMAIN': 'T-W864-IX-225', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\', 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files', 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files (x86)', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'NO_EM_RESTART': '1', 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)', 'OURDRIVE': 'C:', 'MOZ_HIDE_RESULTS_TABLE': '1', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-225', 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Local', 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-225', 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-225', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'PROGRAMW6432': 'C:\\Program Files', 'USERNAME': 'cltbld', 'LOGONSERVER': '\\\\T-W864-IX-225', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'PROGRAMDATA': 'C:\\ProgramData', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'PROMPT': '$P$G', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Roaming', 'HOMEDRIVE': 'C:', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROCESSOR_ARCHITEW6432': 'AMD64', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
13:23:11 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'functools32==3.2.3-2'] in C:\slave\test\build
13:23:11 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub functools32==3.2.3-2
13:23:11 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
13:23:11 INFO - 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Roaming',
13:23:11 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files',
13:23:11 INFO - 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files',
13:23:11 INFO - 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files',
13:23:11 INFO - 'COMPUTERNAME': 'T-W864-IX-225',
13:23:11 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
13:23:11 INFO - 'DCLOCATION': 'SCL3',
13:23:11 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
13:23:11 INFO - 'FP_NO_HOST_CHECK': 'NO',
13:23:11 INFO - 'HOMEDRIVE': 'C:',
13:23:11 INFO - 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-225',
13:23:11 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
13:23:11 INFO - 'KTS_VERSION': '1.19c',
13:23:11 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Local',
13:23:11 INFO - 'LOGONSERVER': '\\\\T-W864-IX-225',
13:23:11 INFO - 'MONDIR': 'C:\\Monitor_config\\',
13:23:11 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
13:23:11 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
13:23:11 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
13:23:11 INFO - 'MOZ_NO_REMOTE': '1',
13:23:11 INFO - 'NO_EM_RESTART': '1',
13:23:11 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
13:23:11 INFO - 'NUMBER_OF_PROCESSORS': '8',
13:23:11 INFO - 'OS': 'Windows_NT',
13:23:11 INFO - 'OURDRIVE': 'C:',
13:23:11 INFO - 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
13:23:11 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
13:23:11 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
13:23:11 INFO - 'PROCESSOR_ARCHITEW6432': 'AMD64',
13:23:11 INFO - 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel',
13:23:11 INFO - 'PROCESSOR_LEVEL': '6',
13:23:11 INFO - 'PROCESSOR_REVISION': '1e05',
13:23:11 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
13:23:11 INFO - 'PROGRAMFILES': 'C:\\Program Files (x86)',
13:23:11 INFO - 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)',
13:23:11 INFO - 'PROGRAMW6432': 'C:\\Program Files',
13:23:11 INFO - 'PROMPT': '$P$G',
13:23:11 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
13:23:11 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\',
13:23:11 INFO - 'PUBLIC': 'C:\\Users\\Public',
13:23:11 INFO - 'PWD': 'C:\\slave\\test',
13:23:11 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
13:23:11 INFO - 'SLAVEDIR': 'C:\\slave\\',
13:23:11 INFO - 'SYSTEMDRIVE': 'C:',
13:23:11 INFO - 'SYSTEMROOT': 'C:\\windows',
13:23:11 INFO - 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
13:23:11 INFO - 'TEST1': 'testie',
13:23:11 INFO - 'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
13:23:11 INFO - 'USERDOMAIN': 'T-W864-IX-225',
13:23:11 INFO - 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-225',
13:23:11 INFO - 'USERNAME': 'cltbld',
13:23:11 INFO - 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-225',
13:23:11 INFO - 'WINDIR': 'C:\\windows',
13:23:11 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
13:23:12 INFO - Ignoring indexes: http://pypi.python.org/simple/
13:23:12 INFO - Downloading/unpacking functools32==3.2.3-2
13:23:12 INFO - Downloading functools32-3.2.3-2.tar.gz
13:23:12 INFO - Running setup.py egg_info for package functools32
13:23:12 INFO - warning: no files found matching '*.txt'
13:23:12 INFO - no previously-included directories found matching 'build'
13:23:12 INFO - no previously-included directories found matching 'dist'
13:23:12 INFO - no previously-included directories found matching '.git*'
13:23:12 INFO - Installing collected packages: functools32
13:23:12 INFO - Running setup.py install for functools32
13:23:12 INFO - warning: no files found matching '*.txt'
13:23:12 INFO - no previously-included directories found matching 'build'
13:23:12 INFO - no previously-included directories found matching 'dist'
13:23:12 INFO - no previously-included directories found matching '.git*'
13:23:12 INFO - Successfully installed functools32
13:23:12 INFO - Cleaning up...
13:23:12 INFO - Return code: 0
13:23:12 INFO - Installing blobuploader==1.2.4 into virtualenv C:\slave\test\build\venv
13:23:12 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
13:23:12 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
13:23:12 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
13:23:12 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
13:23:12 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'blobuploader==1.2.4']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x025E5250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x025FA188>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x0254DFF8>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01D28DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0251C230>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x025ED520>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build', 'env': {'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'TEST1': 'testie', 'COMPUTERNAME': 'T-W864-IX-225', 'USERDOMAIN': 'T-W864-IX-225', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\', 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files', 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files (x86)', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'NO_EM_RESTART': '1', 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)', 'OURDRIVE': 'C:', 'MOZ_HIDE_RESULTS_TABLE': '1', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-225', 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Local', 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-225', 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-225', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'PROGRAMW6432': 'C:\\Program Files', 'USERNAME': 'cltbld', 'LOGONSERVER': '\\\\T-W864-IX-225', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'PROGRAMDATA': 'C:\\ProgramData', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'PROMPT': '$P$G', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Roaming', 'HOMEDRIVE': 'C:', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROCESSOR_ARCHITEW6432': 'AMD64', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
13:23:12 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub', 'blobuploader==1.2.4'] in C:\slave\test\build
13:23:12 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub blobuploader==1.2.4
13:23:12 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
13:23:12 INFO - 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Roaming',
13:23:12 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files',
13:23:12 INFO - 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files',
13:23:12 INFO - 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files',
13:23:12 INFO - 'COMPUTERNAME': 'T-W864-IX-225',
13:23:12 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
13:23:12 INFO - 'DCLOCATION': 'SCL3',
13:23:12 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
13:23:12 INFO - 'FP_NO_HOST_CHECK': 'NO',
13:23:12 INFO - 'HOMEDRIVE': 'C:',
13:23:12 INFO - 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-225',
13:23:12 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
13:23:12 INFO - 'KTS_VERSION': '1.19c',
13:23:12 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Local',
13:23:12 INFO - 'LOGONSERVER': '\\\\T-W864-IX-225',
13:23:12 INFO - 'MONDIR': 'C:\\Monitor_config\\',
13:23:12 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
13:23:12 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
13:23:12 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
13:23:12 INFO - 'MOZ_NO_REMOTE': '1',
13:23:12 INFO - 'NO_EM_RESTART': '1',
13:23:12 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
13:23:12 INFO - 'NUMBER_OF_PROCESSORS': '8',
13:23:12 INFO - 'OS': 'Windows_NT',
13:23:12 INFO - 'OURDRIVE': 'C:',
13:23:12 INFO - 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
13:23:12 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
13:23:12 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
13:23:12 INFO - 'PROCESSOR_ARCHITEW6432': 'AMD64',
13:23:12 INFO - 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel',
13:23:12 INFO - 'PROCESSOR_LEVEL': '6',
13:23:12 INFO - 'PROCESSOR_REVISION': '1e05',
13:23:12 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
13:23:12 INFO - 'PROGRAMFILES': 'C:\\Program Files (x86)',
13:23:12 INFO - 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)',
13:23:12 INFO - 'PROGRAMW6432': 'C:\\Program Files',
13:23:12 INFO - 'PROMPT': '$P$G',
13:23:12 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
13:23:12 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\',
13:23:12 INFO - 'PUBLIC': 'C:\\Users\\Public',
13:23:12 INFO - 'PWD': 'C:\\slave\\test',
13:23:12 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
13:23:12 INFO - 'SLAVEDIR': 'C:\\slave\\',
13:23:12 INFO - 'SYSTEMDRIVE': 'C:',
13:23:12 INFO - 'SYSTEMROOT': 'C:\\windows',
13:23:12 INFO - 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
13:23:12 INFO - 'TEST1': 'testie',
13:23:12 INFO - 'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
13:23:12 INFO - 'USERDOMAIN': 'T-W864-IX-225',
13:23:12 INFO - 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-225',
13:23:12 INFO - 'USERNAME': 'cltbld',
13:23:12 INFO - 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-225',
13:23:12 INFO - 'WINDIR': 'C:\\windows',
13:23:12 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
13:23:12 INFO - Ignoring indexes: http://pypi.python.org/simple/
13:23:12 INFO - Downloading/unpacking blobuploader==1.2.4
13:23:12 INFO - Downloading blobuploader-1.2.4.tar.gz
13:23:12 INFO - Running setup.py egg_info for package blobuploader
13:23:12 INFO - Downloading/unpacking requests==1.2.3. (from blobuploader==1.2.4)
13:23:15 INFO - Running setup.py egg_info for package requests
13:23:15 INFO - Downloading/unpacking docopt==0.6.1 (from blobuploader==1.2.4)
13:23:15 INFO - Downloading docopt-0.6.1.tar.gz
13:23:15 INFO - Running setup.py egg_info for package docopt
13:23:15 INFO - Installing collected packages: blobuploader, docopt, requests
13:23:15 INFO - Running setup.py install for blobuploader
13:23:15 INFO - Running setup.py install for docopt
13:23:15 INFO - Running setup.py install for requests
13:23:15 INFO - Successfully installed blobuploader docopt requests
13:23:15 INFO - Cleaning up...
13:23:15 INFO - Return code: 0
13:23:15 INFO - Installing None into virtualenv C:\slave\test\build\venv
13:23:15 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
13:23:15 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
13:23:15 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
13:23:15 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
13:23:15 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--no-deps', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x025E5250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x025FA188>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x0254DFF8>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01D28DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0251C230>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x025ED520>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build\\tests\\config', 'env': {'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'TEST1': 'testie', 'COMPUTERNAME': 'T-W864-IX-225', 'USERDOMAIN': 'T-W864-IX-225', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\', 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files', 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files (x86)', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'NO_EM_RESTART': '1', 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)', 'OURDRIVE': 'C:', 'MOZ_HIDE_RESULTS_TABLE': '1', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-225', 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Local', 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-225', 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-225', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'PROGRAMW6432': 'C:\\Program Files', 'USERNAME': 'cltbld', 'LOGONSERVER': '\\\\T-W864-IX-225', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'PROGRAMDATA': 'C:\\ProgramData', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'PROMPT': '$P$G', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Roaming', 'HOMEDRIVE': 'C:', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROCESSOR_ARCHITEW6432': 'AMD64', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
13:23:15 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--no-deps', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub'] in C:\slave\test\build\tests\config
13:23:15 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --no-deps --timeout 120 -r C:\slave\test\build\tests\config\marionette_requirements.txt --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub
13:23:15 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
13:23:15 INFO - 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Roaming',
13:23:15 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files',
13:23:15 INFO - 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files',
13:23:15 INFO - 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files',
13:23:15 INFO - 'COMPUTERNAME': 'T-W864-IX-225',
13:23:15 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
13:23:15 INFO - 'DCLOCATION': 'SCL3',
13:23:15 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
13:23:15 INFO - 'FP_NO_HOST_CHECK': 'NO',
13:23:15 INFO - 'HOMEDRIVE': 'C:',
13:23:15 INFO - 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-225',
13:23:15 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
13:23:15 INFO - 'KTS_VERSION': '1.19c',
13:23:15 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Local',
13:23:15 INFO - 'LOGONSERVER': '\\\\T-W864-IX-225',
13:23:15 INFO - 'MONDIR': 'C:\\Monitor_config\\',
13:23:15 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
13:23:15 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
13:23:15 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
13:23:15 INFO - 'MOZ_NO_REMOTE': '1',
13:23:15 INFO - 'NO_EM_RESTART': '1',
13:23:15 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
13:23:15 INFO - 'NUMBER_OF_PROCESSORS': '8',
13:23:15 INFO - 'OS': 'Windows_NT',
13:23:15 INFO - 'OURDRIVE': 'C:',
13:23:15 INFO - 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
13:23:15 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
13:23:15 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
13:23:15 INFO - 'PROCESSOR_ARCHITEW6432': 'AMD64',
13:23:15 INFO - 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel',
13:23:15 INFO - 'PROCESSOR_LEVEL': '6',
13:23:15 INFO - 'PROCESSOR_REVISION': '1e05',
13:23:15 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
13:23:15 INFO - 'PROGRAMFILES': 'C:\\Program Files (x86)',
13:23:15 INFO - 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)',
13:23:15 INFO - 'PROGRAMW6432': 'C:\\Program Files',
13:23:15 INFO - 'PROMPT': '$P$G',
13:23:15 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
13:23:15 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\',
13:23:15 INFO - 'PUBLIC': 'C:\\Users\\Public',
13:23:15 INFO - 'PWD': 'C:\\slave\\test',
13:23:15 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
13:23:15 INFO - 'SLAVEDIR': 'C:\\slave\\',
13:23:15 INFO - 'SYSTEMDRIVE': 'C:',
13:23:15 INFO - 'SYSTEMROOT': 'C:\\windows',
13:23:15 INFO - 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
13:23:15 INFO - 'TEST1': 'testie',
13:23:15 INFO - 'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
13:23:15 INFO - 'USERDOMAIN': 'T-W864-IX-225',
13:23:15 INFO - 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-225',
13:23:15 INFO - 'USERNAME': 'cltbld',
13:23:15 INFO - 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-225',
13:23:15 INFO - 'WINDIR': 'C:\\windows',
13:23:15 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
13:23:18 INFO - Ignoring indexes: http://pypi.python.org/simple/
13:23:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\manifestparser
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmanifestparser
13:23:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozcrash
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozcrash
13:23:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdebug
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdebug
13:23:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdevice
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdevice
13:23:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozfile
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozfile
13:23:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozhttpd
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozhttpd
13:23:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinfo
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinfo
13:23:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinstall
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinstall
13:23:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozleak
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozleak
13:23:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozlog
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozlog
13:23:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\moznetwork
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoznetwork
13:23:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprocess
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprocess
13:23:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprofile
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprofile
13:23:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozrunner
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozrunner
13:23:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozscreenshot
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozscreenshot
13:23:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\moztest
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoztest
13:23:18 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozversion
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozversion
13:23:18 INFO - Unpacking c:\slave\test\build\tests\tools\wptserve
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Ctools%5Cwptserve
13:23:18 INFO - Unpacking c:\slave\test\build\tests\marionette\client
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cclient
13:23:18 INFO - Unpacking c:\slave\test\build\tests\marionette\harness\marionette_harness\runner\mixins\browsermob-proxy-py
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Charness%5Cmarionette_harness%5Crunner%5Cmixins%5Cbrowsermob-proxy-py
13:23:18 INFO - Unpacking c:\slave\test\build\tests\marionette\harness
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Charness
13:23:18 INFO - Unpacking c:\slave\test\build\tests\marionette\puppeteer\firefox
13:23:18 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cpuppeteer%5Cfirefox
13:23:32 INFO - Installing collected packages: browsermob-proxy, firefox-puppeteer, manifestparser, marionette-driver, marionette-harness, mozcrash, mozdebug, mozdevice, mozfile, mozhttpd, mozinfo, mozInstall, mozleak, mozlog, moznetwork, mozprocess, mozprofile, mozrunner, mozscreenshot, moztest, mozversion, wptserve
13:23:32 INFO - Running setup.py install for browsermob-proxy
13:23:32 INFO - Running setup.py install for firefox-puppeteer
13:23:32 INFO - Running setup.py install for manifestparser
13:23:32 INFO - Installing manifestparser-script.py script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing manifestparser.exe script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Running setup.py install for marionette-driver
13:23:32 INFO - Running setup.py install for marionette-harness
13:23:32 INFO - Installing marionette-script.py script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing marionette.exe script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Running setup.py install for mozcrash
13:23:32 INFO - Running setup.py install for mozdebug
13:23:32 INFO - Running setup.py install for mozdevice
13:23:32 INFO - Installing sutini-script.py script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing sutini.exe script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing dm-script.py script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing dm.exe script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Running setup.py install for mozfile
13:23:32 INFO - Running setup.py install for mozhttpd
13:23:32 INFO - Installing mozhttpd-script.py script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing mozhttpd.exe script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Running setup.py install for mozinfo
13:23:32 INFO - Installing mozinfo-script.py script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing mozinfo.exe script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Running setup.py install for mozInstall
13:23:32 INFO - Installing moz_remove_from_system-script.py script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing moz_remove_from_system.exe script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing mozuninstall-script.py script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing mozuninstall.exe script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing mozinstall-script.py script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing mozinstall.exe script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing moz_add_to_system-script.py script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing moz_add_to_system.exe script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Running setup.py install for mozleak
13:23:32 INFO - Running setup.py install for mozlog
13:23:32 INFO - Installing structlog-script.py script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing structlog.exe script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Running setup.py install for moznetwork
13:23:32 INFO - Installing moznetwork-script.py script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing moznetwork.exe script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Running setup.py install for mozprocess
13:23:32 INFO - Running setup.py install for mozprofile
13:23:32 INFO - Installing mozprofile-script.py script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing mozprofile.exe script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing diff-profiles-script.py script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing diff-profiles.exe script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing view-profile-script.py script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing view-profile.exe script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Running setup.py install for mozrunner
13:23:32 INFO - Installing mozrunner-script.py script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing mozrunner.exe script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Running setup.py install for mozscreenshot
13:23:32 INFO - Running setup.py install for moztest
13:23:32 INFO - Running setup.py install for mozversion
13:23:32 INFO - Installing mozversion-script.py script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Installing mozversion.exe script to C:\slave\test\build\venv\Scripts
13:23:32 INFO - Running setup.py install for wptserve
13:23:32 INFO - Successfully installed browsermob-proxy firefox-puppeteer manifestparser marionette-driver marionette-harness mozcrash mozdebug mozdevice mozfile mozhttpd mozinfo mozInstall mozleak mozlog moznetwork mozprocess mozprofile mozrunner mozscreenshot moztest mozversion wptserve
13:23:32 INFO - Cleaning up...
13:23:32 INFO - Return code: 0
13:23:32 INFO - Installing None into virtualenv C:\slave\test\build\venv
13:23:32 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
13:23:32 INFO - http://pypi.pvt.build.mozilla.org/pub matches http://pypi.pvt.build.mozilla.org
13:23:32 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
13:23:32 INFO - http://pypi.pub.build.mozilla.org/pub matches http://pypi.pub.build.mozilla.org
13:23:32 INFO - retry: Calling run_command with args: [['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub']], kwargs: {'error_level': 'warning', 'error_list': [{'substr': 'not found or a compiler error:', 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x025E5250>, 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x025FA188>, 'level': 'warning'}, {'regex': <_sre.SRE_Pattern object at 0x0254DFF8>, 'level': 'debug'}, {'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01D28DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0251C230>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x025ED520>, 'level': 'critical'}], 'cwd': 'C:\\slave\\test\\build\\tests\\config', 'env': {'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'TEST1': 'testie', 'COMPUTERNAME': 'T-W864-IX-225', 'USERDOMAIN': 'T-W864-IX-225', 'KTS_VERSION': '1.19c', 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\', 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files', 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel', 'PROGRAMFILES': 'C:\\Program Files (x86)', 'PROCESSOR_REVISION': '1e05', 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com', 'SYSTEMROOT': 'C:\\windows', 'NO_EM_RESTART': '1', 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)', 'OURDRIVE': 'C:', 'MOZ_HIDE_RESULTS_TABLE': '1', 'XPCOM_DEBUG_BREAK': 'warn', 'MONDIR': 'C:\\Monitor_config\\', 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp', 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files', 'RUNLOGFILE': 'C:\\slave\\\\runslave.log', 'PROCESSOR_ARCHITECTURE': 'x86', 'ALLUSERSPROFILE': 'C:\\ProgramData', 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-225', 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Local', 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-225', 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-225', 'MOZBUILDDIR': 'C:\\mozilla-build\\', 'PROGRAMW6432': 'C:\\Program Files', 'USERNAME': 'cltbld', 'LOGONSERVER': '\\\\T-W864-IX-225', 'MOZ_NO_REMOTE': '1', 'COMSPEC': 'C:\\windows\\system32\\cmd.exe', 'PROGRAMDATA': 'C:\\ProgramData', 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json', 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg', 'PROMPT': '$P$G', 'NO_FAIL_ON_TEST_ERRORS': '1', 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC', 'FP_NO_HOST_CHECK': 'NO', 'DCLOCATION': 'SCL3', 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Roaming', 'HOMEDRIVE': 'C:', 'SYSTEMDRIVE': 'C:', 'SLAVEDIR': 'C:\\slave\\', 'NUMBER_OF_PROCESSORS': '8', 'PWD': 'C:\\slave\\test', 'PROCESSOR_LEVEL': '6', 'KTS_HOME': 'C:\\Program Files\\KTS', 'PROCESSOR_ARCHITEW6432': 'AMD64', 'MOZ_CRASHREPORTER_NO_REPORT': '1', 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files', 'OS': 'Windows_NT', 'PUBLIC': 'C:\\Users\\Public', 'WINDIR': 'C:\\windows'}}, attempt #1
13:23:32 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'install', '--timeout', '120', '-r', 'C:\\slave\\test\\build\\tests\\config\\marionette_requirements.txt', '--no-index', '--find-links', 'http://pypi.pvt.build.mozilla.org/pub', '--find-links', 'http://pypi.pub.build.mozilla.org/pub'] in C:\slave\test\build\tests\config
13:23:32 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip install --timeout 120 -r C:\slave\test\build\tests\config\marionette_requirements.txt --no-index --find-links http://pypi.pvt.build.mozilla.org/pub --find-links http://pypi.pub.build.mozilla.org/pub
13:23:32 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
13:23:32 INFO - 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Roaming',
13:23:32 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files',
13:23:32 INFO - 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files',
13:23:32 INFO - 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files',
13:23:32 INFO - 'COMPUTERNAME': 'T-W864-IX-225',
13:23:32 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
13:23:32 INFO - 'DCLOCATION': 'SCL3',
13:23:32 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
13:23:32 INFO - 'FP_NO_HOST_CHECK': 'NO',
13:23:32 INFO - 'HOMEDRIVE': 'C:',
13:23:32 INFO - 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-225',
13:23:32 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
13:23:32 INFO - 'KTS_VERSION': '1.19c',
13:23:32 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Local',
13:23:32 INFO - 'LOGONSERVER': '\\\\T-W864-IX-225',
13:23:32 INFO - 'MONDIR': 'C:\\Monitor_config\\',
13:23:32 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
13:23:32 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
13:23:32 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
13:23:32 INFO - 'MOZ_NO_REMOTE': '1',
13:23:32 INFO - 'NO_EM_RESTART': '1',
13:23:32 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
13:23:32 INFO - 'NUMBER_OF_PROCESSORS': '8',
13:23:32 INFO - 'OS': 'Windows_NT',
13:23:32 INFO - 'OURDRIVE': 'C:',
13:23:32 INFO - 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
13:23:32 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
13:23:32 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
13:23:32 INFO - 'PROCESSOR_ARCHITEW6432': 'AMD64',
13:23:32 INFO - 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel',
13:23:32 INFO - 'PROCESSOR_LEVEL': '6',
13:23:32 INFO - 'PROCESSOR_REVISION': '1e05',
13:23:32 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
13:23:32 INFO - 'PROGRAMFILES': 'C:\\Program Files (x86)',
13:23:32 INFO - 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)',
13:23:32 INFO - 'PROGRAMW6432': 'C:\\Program Files',
13:23:32 INFO - 'PROMPT': '$P$G',
13:23:32 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
13:23:32 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\',
13:23:32 INFO - 'PUBLIC': 'C:\\Users\\Public',
13:23:32 INFO - 'PWD': 'C:\\slave\\test',
13:23:32 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
13:23:32 INFO - 'SLAVEDIR': 'C:\\slave\\',
13:23:32 INFO - 'SYSTEMDRIVE': 'C:',
13:23:32 INFO - 'SYSTEMROOT': 'C:\\windows',
13:23:32 INFO - 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
13:23:32 INFO - 'TEST1': 'testie',
13:23:32 INFO - 'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
13:23:32 INFO - 'USERDOMAIN': 'T-W864-IX-225',
13:23:32 INFO - 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-225',
13:23:32 INFO - 'USERNAME': 'cltbld',
13:23:32 INFO - 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-225',
13:23:32 INFO - 'WINDIR': 'C:\\windows',
13:23:32 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
13:23:35 INFO - Ignoring indexes: http://pypi.python.org/simple/
13:23:35 INFO - Unpacking c:\slave\test\build\tests\mozbase\manifestparser
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmanifestparser
13:23:35 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozcrash
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozcrash
13:23:35 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdebug
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdebug
13:23:35 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozdevice
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozdevice
13:23:35 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozfile
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozfile
13:23:35 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozhttpd
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozhttpd
13:23:35 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinfo
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinfo
13:23:35 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozinstall
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozinstall
13:23:35 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozleak
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozleak
13:23:35 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozlog
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozlog
13:23:35 INFO - Unpacking c:\slave\test\build\tests\mozbase\moznetwork
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoznetwork
13:23:35 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprocess
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprocess
13:23:35 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozprofile
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozprofile
13:23:35 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozrunner
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozrunner
13:23:35 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozscreenshot
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozscreenshot
13:23:35 INFO - Unpacking c:\slave\test\build\tests\mozbase\moztest
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmoztest
13:23:35 INFO - Unpacking c:\slave\test\build\tests\mozbase\mozversion
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmozbase%5Cmozversion
13:23:35 INFO - Unpacking c:\slave\test\build\tests\tools\wptserve
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Ctools%5Cwptserve
13:23:35 INFO - Unpacking c:\slave\test\build\tests\marionette\client
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cclient
13:23:35 INFO - Unpacking c:\slave\test\build\tests\marionette\harness\marionette_harness\runner\mixins\browsermob-proxy-py
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Charness%5Cmarionette_harness%5Crunner%5Cmixins%5Cbrowsermob-proxy-py
13:23:35 INFO - Unpacking c:\slave\test\build\tests\marionette\harness
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Charness
13:23:35 INFO - Unpacking c:\slave\test\build\tests\marionette\puppeteer\firefox
13:23:35 INFO - Running setup.py egg_info for package from file:///c%7C%5Cslave%5Ctest%5Cbuild%5Ctests%5Cmarionette%5Cpuppeteer%5Cfirefox
13:23:43 INFO - Requirement already satisfied (use --upgrade to upgrade): mozfile>=1.0 in c:\slave\test\build\venv\lib\site-packages (from mozcrash->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 2))
13:23:43 INFO - Requirement already satisfied (use --upgrade to upgrade): mozlog>=3.0 in c:\slave\test\build\venv\lib\site-packages (from mozcrash->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 2))
13:23:43 INFO - Requirement already satisfied (use --upgrade to upgrade): mozinfo in c:\slave\test\build\venv\lib\site-packages (from mozdebug->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 3))
13:23:43 INFO - Requirement already satisfied (use --upgrade to upgrade): moznetwork>=0.24 in c:\slave\test\build\venv\lib\site-packages (from mozdevice->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 4))
13:23:43 INFO - Requirement already satisfied (use --upgrade to upgrade): mozprocess>=0.19 in c:\slave\test\build\venv\lib\site-packages (from mozdevice->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 4))
13:23:43 INFO - Downloading/unpacking blessings>=1.3 (from mozlog->-r C:\slave\test\build\tests\config\mozbase_requirements.txt (line 10))
13:23:43 INFO - Downloading blessings-1.6.tar.gz
13:23:43 INFO - Running setup.py egg_info for package blessings
13:23:43 INFO - Requirement already satisfied (use --upgrade to upgrade): requests>=1.1.0 in c:\slave\test\build\venv\lib\site-packages (from browsermob-proxy->-r C:\slave\test\build\tests\config\marionette_requirements.txt (line 5))
13:23:43 INFO - Installing collected packages: blessings, browsermob-proxy, firefox-puppeteer, manifestparser, marionette-driver, marionette-harness, mozcrash, mozdebug, mozdevice, mozhttpd, mozInstall, mozleak, mozprofile, mozrunner, mozscreenshot, moztest, mozversion, wptserve
13:23:43 INFO - Running setup.py install for blessings
13:23:43 INFO - Running setup.py install for browsermob-proxy
13:23:43 INFO - Running setup.py install for firefox-puppeteer
13:23:43 INFO - Running setup.py install for manifestparser
13:23:43 INFO - Installing manifestparser-script.py script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Installing manifestparser.exe script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Running setup.py install for marionette-driver
13:23:43 INFO - Running setup.py install for marionette-harness
13:23:43 INFO - Installing marionette-script.py script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Installing marionette.exe script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Running setup.py install for mozcrash
13:23:43 INFO - Running setup.py install for mozdebug
13:23:43 INFO - Running setup.py install for mozdevice
13:23:43 INFO - Installing sutini-script.py script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Installing sutini.exe script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Installing dm-script.py script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Installing dm.exe script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Running setup.py install for mozhttpd
13:23:43 INFO - Installing mozhttpd-script.py script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Installing mozhttpd.exe script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Running setup.py install for mozInstall
13:23:43 INFO - Installing moz_remove_from_system-script.py script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Installing moz_remove_from_system.exe script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Installing mozuninstall-script.py script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Installing mozuninstall.exe script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Installing mozinstall-script.py script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Installing mozinstall.exe script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Installing moz_add_to_system-script.py script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Installing moz_add_to_system.exe script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Running setup.py install for mozleak
13:23:43 INFO - Running setup.py install for mozprofile
13:23:43 INFO - Installing mozprofile-script.py script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Installing mozprofile.exe script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Installing diff-profiles-script.py script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Installing diff-profiles.exe script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Installing view-profile-script.py script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Installing view-profile.exe script to C:\slave\test\build\venv\Scripts
13:23:43 INFO - Running setup.py install for mozrunner
13:23:45 INFO - Installing mozrunner-script.py script to C:\slave\test\build\venv\Scripts
13:23:45 INFO - Installing mozrunner.exe script to C:\slave\test\build\venv\Scripts
13:23:45 INFO - Running setup.py install for mozscreenshot
13:23:45 INFO - Running setup.py install for moztest
13:23:45 INFO - Running setup.py install for mozversion
13:23:45 INFO - Installing mozversion-script.py script to C:\slave\test\build\venv\Scripts
13:23:45 INFO - Installing mozversion.exe script to C:\slave\test\build\venv\Scripts
13:23:45 INFO - Running setup.py install for wptserve
13:23:45 INFO - Successfully installed blessings browsermob-proxy firefox-puppeteer manifestparser marionette-driver marionette-harness mozcrash mozdebug mozdevice mozhttpd mozInstall mozleak mozprofile mozrunner mozscreenshot moztest mozversion wptserve
13:23:45 INFO - Cleaning up...
13:23:45 INFO - Return code: 0
13:23:45 INFO - Done creating virtualenv C:\slave\test\build\venv.
13:23:45 INFO - Getting output from command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'freeze']
13:23:45 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip freeze
13:23:45 INFO - Reading from file tmpfile_stdout
13:23:45 INFO - Using _rmtree_windows ...
13:23:45 INFO - Using _rmtree_windows ...
13:23:45 INFO - Current package versions:
13:23:45 INFO - blessings == 1.6
13:23:45 INFO - blobuploader == 1.2.4
13:23:45 INFO - browsermob-proxy == 0.6.0
13:23:45 INFO - distribute == 0.6.14
13:23:45 INFO - docopt == 0.6.1
13:23:45 INFO - firefox-puppeteer == 52.1.0
13:23:45 INFO - functools32 == 3.2.3-2
13:23:45 INFO - jsonschema == 2.5.1
13:23:45 INFO - manifestparser == 1.1
13:23:45 INFO - marionette-driver == 2.2.0
13:23:45 INFO - marionette-harness == 4.0.0
13:23:45 INFO - mozInstall == 1.12
13:23:45 INFO - mozcrash == 1.0
13:23:45 INFO - mozdebug == 0.1
13:23:45 INFO - mozdevice == 0.48
13:23:45 INFO - mozfile == 1.2
13:23:45 INFO - mozhttpd == 0.7
13:23:45 INFO - mozinfo == 0.9
13:23:45 INFO - mozleak == 0.1
13:23:45 INFO - mozlog == 3.4
13:23:45 INFO - moznetwork == 0.27
13:23:45 INFO - mozprocess == 0.23
13:23:45 INFO - mozprofile == 0.28
13:23:45 INFO - mozrunner == 6.13
13:23:45 INFO - mozscreenshot == 0.1
13:23:45 INFO - mozsystemmonitor == 0.3
13:23:45 INFO - moztest == 0.8
13:23:45 INFO - mozversion == 1.4
13:23:45 INFO - requests == 1.2.3
13:23:45 INFO - wptserve == 1.4.0
13:23:45 INFO - Running post-action listener: _resource_record_post_action
13:23:45 INFO - Running post-action listener: _start_resource_monitoring
13:23:45 INFO - Starting resource monitoring.
13:23:45 INFO - [mozharness: 2017-01-05 21:23:45.886000Z] Finished create-virtualenv step (success)
13:23:45 INFO - [mozharness: 2017-01-05 21:23:45.887000Z] Running pull step.
13:23:45 INFO - Running pre-action listener: _resource_record_pre_action
13:23:45 INFO - Running main action method: pull
13:23:45 INFO - Pull has nothing to do!
13:23:45 INFO - Running post-action listener: _resource_record_post_action
13:23:45 INFO - [mozharness: 2017-01-05 21:23:45.887000Z] Finished pull step (success)
13:23:45 INFO - [mozharness: 2017-01-05 21:23:45.887000Z] Running install step.
13:23:45 INFO - Running pre-action listener: _resource_record_pre_action
13:23:45 INFO - Running main action method: install
13:23:45 INFO - Getting output from command: ['C:\\slave\\test\\build\\venv\\Scripts\\pip', 'freeze']
13:23:45 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\pip freeze
13:23:46 INFO - Reading from file tmpfile_stdout
13:23:46 INFO - Using _rmtree_windows ...
13:23:46 INFO - Using _rmtree_windows ...
13:23:46 INFO - Detecting whether we're running mozinstall >=1.0...
13:23:46 INFO - Getting output from command: ['C:\\slave\\test/build/venv/scripts/python', 'C:\\slave\\test/build/venv/scripts/mozinstall-script.py', '-h']
13:23:46 INFO - Copy/paste: C:\slave\test/build/venv/scripts/python C:\slave\test/build/venv/scripts/mozinstall-script.py -h
13:23:46 INFO - Reading from file tmpfile_stdout
13:23:46 INFO - Output received:
13:23:46 INFO - Usage: mozinstall-script.py [options] installer
13:23:46 INFO - Options:
13:23:46 INFO - -h, --help show this help message and exit
13:23:46 INFO - -d DEST, --destination=DEST
13:23:46 INFO - Directory to install application into. [default:
13:23:46 INFO - "C:\slave\test"]
13:23:46 INFO - --app=APP Application being installed. [default: firefox]
13:23:46 INFO - Using _rmtree_windows ...
13:23:46 INFO - Using _rmtree_windows ...
13:23:46 INFO - mkdir: C:\slave\test\build\application
13:23:46 INFO - Getting output from command: ['C:\\slave\\test/build/venv/scripts/python', 'C:\\slave\\test/build/venv/scripts/mozinstall-script.py', 'C:\\slave\\test\\build\\firefox-52.0a2.en-US.win64.zip', '--destination', 'C:\\slave\\test\\build\\application']
13:23:46 INFO - Copy/paste: C:\slave\test/build/venv/scripts/python C:\slave\test/build/venv/scripts/mozinstall-script.py C:\slave\test\build\firefox-52.0a2.en-US.win64.zip --destination C:\slave\test\build\application
ProcessManager NOT managing child processes
13:23:48 INFO - Reading from file tmpfile_stdout
13:23:48 INFO - Output received:
13:23:48 INFO - C:\slave\test\build\application\firefox\firefox.exe
13:23:48 INFO - Using _rmtree_windows ...
13:23:48 INFO - Using _rmtree_windows ...
13:23:48 INFO - Running post-action listener: _resource_record_post_action
13:23:48 INFO - [mozharness: 2017-01-05 21:23:48.665000Z] Finished install step (success)
13:23:48 INFO - [mozharness: 2017-01-05 21:23:48.665000Z] Running run-tests step.
13:23:48 INFO - Running pre-action listener: _resource_record_pre_action
13:23:48 INFO - Running main action method: run_tests
13:23:48 INFO - mkdir: C:\slave\test\build\blobber_upload_dir
13:23:48 INFO - Minidump filename unknown. Determining based upon platform and architecture.
13:23:48 INFO - Minidump tooltool manifest unknown. Determining based upon platform and architecture.
13:23:48 INFO - grabbing minidump binary from tooltool
13:23:48 INFO - proxxy config: {'regions': ['.use1.', '.usw2.', '.scl3'], 'instances': ['proxxy1.srv.releng.use1.mozilla.com', 'proxxy1.srv.releng.usw2.mozilla.com', 'proxxy1.srv.releng.scl3.mozilla.com'], 'urls': [('http://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp.mozilla.org', 'ftp.mozilla.org'), ('https://ftp-ssl.mozilla.org', 'ftp.mozilla.org'), ('http://pypi.pvt.build.mozilla.org', 'pypi.pvt.build.mozilla.org'), ('http://pypi.pub.build.mozilla.org', 'pypi.pub.build.mozilla.org')]}
13:23:48 INFO - retry: Calling run_command with args: (['c:\\mozilla-build\\python27\\python.exe', 'C:/mozilla-build/tooltool.py', '--url', 'https://api.pub.build.mozilla.org/tooltool/', '--authentication-file', 'c:\\builds\\relengapi.tok', 'fetch', '-m', 'C:\\slave\\test\\build\\tests\\config/tooltool-manifests/win32/releng.manifest', '-o'],), kwargs: {'output_timeout': 600, 'error_list': [{'substr': 'command not found', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x01D28DE8>, 'level': 'warning'}, {'substr': 'Traceback (most recent call last)', 'level': 'error'}, {'substr': 'SyntaxError: ', 'level': 'error'}, {'substr': 'TypeError: ', 'level': 'error'}, {'substr': 'NameError: ', 'level': 'error'}, {'substr': 'ZeroDivisionError: ', 'level': 'error'}, {'regex': <_sre.SRE_Pattern object at 0x0251C230>, 'level': 'critical'}, {'regex': <_sre.SRE_Pattern object at 0x025ED520>, 'level': 'critical'}, {'substr': 'ERROR - ', 'level': 'error'}], 'cwd': 'C:\\slave\\test\\build', 'privileged': False}, attempt #1
13:23:48 INFO - Running command: ['c:\\mozilla-build\\python27\\python.exe', 'C:/mozilla-build/tooltool.py', '--url', 'https://api.pub.build.mozilla.org/tooltool/', '--authentication-file', 'c:\\builds\\relengapi.tok', 'fetch', '-m', 'C:\\slave\\test\\build\\tests\\config/tooltool-manifests/win32/releng.manifest', '-o'] in C:\slave\test\build
13:23:48 INFO - Copy/paste: c:\mozilla-build\python27\python.exe C:/mozilla-build/tooltool.py --url https://api.pub.build.mozilla.org/tooltool/ --authentication-file c:\builds\relengapi.tok fetch -m C:\slave\test\build\tests\config/tooltool-manifests/win32/releng.manifest -o
13:23:48 INFO - Calling ['c:\\mozilla-build\\python27\\python.exe', 'C:/mozilla-build/tooltool.py', '--url', 'https://api.pub.build.mozilla.org/tooltool/', '--authentication-file', 'c:\\builds\\relengapi.tok', 'fetch', '-m', 'C:\\slave\\test\\build\\tests\\config/tooltool-manifests/win32/releng.manifest', '-o'] with output_timeout 600
ProcessManager UNABLE to use job objects to manage child processes
13:23:48 INFO - INFO - Attempting to fetch from 'https://api.pub.build.mozilla.org/tooltool/'...
13:23:49 INFO - INFO - File win32-minidump_stackwalk.exe fetched from https://api.pub.build.mozilla.org/tooltool/ as C:\slave\test\build\tmpcw4w2b
13:23:49 INFO - INFO - File integrity verified, renaming tmpcw4w2b to win32-minidump_stackwalk.exe
13:23:49 INFO - Return code: 0
13:23:49 INFO - Chmoding C:\slave\test\build\win32-minidump_stackwalk.exe to 0755
13:23:49 INFO - ENV: MINIDUMP_SAVE_PATH is now C:\slave\test\build\blobber_upload_dir
13:23:49 INFO - Running command: ['C:\\slave\\test\\build\\venv\\Scripts\\python', '-u', 'C:\\slave\\test\\build\\tests\\web-platform\\runtests.py', '--log-raw=-', '--log-raw=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_raw.log', '--log-errorsummary=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_errorsummary.log', '--binary=C:\\slave\\test\\build\\application\\firefox\\firefox.exe', '--symbols-path=https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.crashreporter-symbols.zip', '--stackwalk-binary=C:\\slave\\test\\build\\win32-minidump_stackwalk.exe', '--stackfix-dir=C:\\slave\\test\\build\\tests\\bin', '--test-type=testharness', '--disable-e10s', '--total-chunks=10', '--this-chunk=9', '--prefs-root=C:\\slave\\test\\build\\tests\\web-platform/prefs', '--processes=1', '--config=C:\\slave\\test\\build\\tests\\web-platform/wptrunner.ini', '--ca-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/cacert.pem', '--host-key-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.key', '--host-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.pem', '--certutil-binary=C:\\slave\\test\\build\\tests/bin/certutil'] in C:\slave\test\build
13:23:49 INFO - Copy/paste: C:\slave\test\build\venv\Scripts\python -u C:\slave\test\build\tests\web-platform\runtests.py --log-raw=- --log-raw=C:\slave\test\build\blobber_upload_dir\wpt_raw.log --log-errorsummary=C:\slave\test\build\blobber_upload_dir\wpt_errorsummary.log --binary=C:\slave\test\build\application\firefox\firefox.exe --symbols-path=https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.crashreporter-symbols.zip --stackwalk-binary=C:\slave\test\build\win32-minidump_stackwalk.exe --stackfix-dir=C:\slave\test\build\tests\bin --test-type=testharness --disable-e10s --total-chunks=10 --this-chunk=9 --prefs-root=C:\slave\test\build\tests\web-platform/prefs --processes=1 --config=C:\slave\test\build\tests\web-platform/wptrunner.ini --ca-cert-path=C:\slave\test\build\tests\web-platform/certs/cacert.pem --host-key-path=C:\slave\test\build\tests\web-platform/certs/web-platform.test.key --host-cert-path=C:\slave\test\build\tests\web-platform/certs/web-platform.test.pem --certutil-binary=C:\slave\test\build\tests/bin/certutil
13:23:49 INFO - Using env: {'ALLUSERSPROFILE': 'C:\\ProgramData',
13:23:49 INFO - 'APPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Roaming',
13:23:49 INFO - 'COMMONPROGRAMFILES': 'C:\\Program Files (x86)\\Common Files',
13:23:49 INFO - 'COMMONPROGRAMFILES(X86)': 'C:\\Program Files (x86)\\Common Files',
13:23:49 INFO - 'COMMONPROGRAMW6432': 'C:\\Program Files\\Common Files',
13:23:49 INFO - 'COMPUTERNAME': 'T-W864-IX-225',
13:23:49 INFO - 'COMSPEC': 'C:\\windows\\system32\\cmd.exe',
13:23:49 INFO - 'DCLOCATION': 'SCL3',
13:23:49 INFO - 'DNSSUFFIX': 'wintest.releng.scl3.mozilla.com',
13:23:49 INFO - 'FP_NO_HOST_CHECK': 'NO',
13:23:49 INFO - 'HOMEDRIVE': 'C:',
13:23:49 INFO - 'HOMEPATH': '\\Users\\cltbld.T-W864-IX-225',
13:23:49 INFO - 'KTS_HOME': 'C:\\Program Files\\KTS',
13:23:49 INFO - 'KTS_VERSION': '1.19c',
13:23:49 INFO - 'LOCALAPPDATA': 'C:\\Users\\cltbld.T-W864-IX-225\\AppData\\Local',
13:23:49 INFO - 'LOGONSERVER': '\\\\T-W864-IX-225',
13:23:49 INFO - 'MINIDUMP_SAVE_PATH': 'C:\\slave\\test\\build\\blobber_upload_dir',
13:23:49 INFO - 'MONDIR': 'C:\\Monitor_config\\',
13:23:49 INFO - 'MOZBUILDDIR': 'C:\\mozilla-build\\',
13:23:49 INFO - 'MOZ_CRASHREPORTER_NO_REPORT': '1',
13:23:49 INFO - 'MOZ_HIDE_RESULTS_TABLE': '1',
13:23:49 INFO - 'MOZ_NO_REMOTE': '1',
13:23:49 INFO - 'NO_EM_RESTART': '1',
13:23:49 INFO - 'NO_FAIL_ON_TEST_ERRORS': '1',
13:23:49 INFO - 'NUMBER_OF_PROCESSORS': '8',
13:23:49 INFO - 'OS': 'Windows_NT',
13:23:49 INFO - 'OURDRIVE': 'C:',
13:23:49 INFO - 'PATH': 'C:\\Program Files (x86)\\NVIDIA Corporation\\PhysX\\Common;C:\\windows\\system32;C:\\windows;C:\\windows\\System32\\Wbem;C:\\windows\\System32\\WindowsPowerShell\\v1.0\\;C:\\mozilla-build\\python27;C:\\mozilla-build\\python27\\Scripts;C:\\mozilla-build\\msys\\bin;C:\\mozilla-build\\vim\\vim72;C:\\mozilla-build\\wget;C:\\mozilla-build\\info-zip;C:\\CoreUtils\\bin;C:\\mozilla-build\\buildbotve\\scripts;C:\\mozilla-build\\hg',
13:23:49 INFO - 'PATHEXT': '.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC',
13:23:49 INFO - 'PROCESSOR_ARCHITECTURE': 'x86',
13:23:49 INFO - 'PROCESSOR_ARCHITEW6432': 'AMD64',
13:23:49 INFO - 'PROCESSOR_IDENTIFIER': 'Intel64 Family 6 Model 30 Stepping 5, GenuineIntel',
13:23:49 INFO - 'PROCESSOR_LEVEL': '6',
13:23:49 INFO - 'PROCESSOR_REVISION': '1e05',
13:23:49 INFO - 'PROGRAMDATA': 'C:\\ProgramData',
13:23:49 INFO - 'PROGRAMFILES': 'C:\\Program Files (x86)',
13:23:49 INFO - 'PROGRAMFILES(X86)': 'C:\\Program Files (x86)',
13:23:49 INFO - 'PROGRAMW6432': 'C:\\Program Files',
13:23:49 INFO - 'PROMPT': '$P$G',
13:23:49 INFO - 'PROPERTIES_FILE': 'C:\\slave\\test/buildprops.json',
13:23:49 INFO - 'PSMODULEPATH': 'C:\\windows\\system32\\WindowsPowerShell\\v1.0\\Modules\\',
13:23:49 INFO - 'PUBLIC': 'C:\\Users\\Public',
13:23:49 INFO - 'PWD': 'C:\\slave\\test',
13:23:49 INFO - 'RUNLOGFILE': 'C:\\slave\\\\runslave.log',
13:23:49 INFO - 'SLAVEDIR': 'C:\\slave\\',
13:23:49 INFO - 'SYSTEMDRIVE': 'C:',
13:23:49 INFO - 'SYSTEMROOT': 'C:\\windows',
13:23:49 INFO - 'TEMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
13:23:49 INFO - 'TEST1': 'testie',
13:23:49 INFO - 'TMP': 'C:\\Users\\CLTBLD~1.T-W\\AppData\\Local\\Temp',
13:23:49 INFO - 'USERDOMAIN': 'T-W864-IX-225',
13:23:49 INFO - 'USERDOMAIN_ROAMINGPROFILE': 'T-W864-IX-225',
13:23:49 INFO - 'USERNAME': 'cltbld',
13:23:49 INFO - 'USERPROFILE': 'C:\\Users\\cltbld.T-W864-IX-225',
13:23:49 INFO - 'WINDIR': 'C:\\windows',
13:23:49 INFO - 'XPCOM_DEBUG_BREAK': 'warn'}
13:23:49 INFO - Calling ['C:\\slave\\test\\build\\venv\\Scripts\\python', '-u', 'C:\\slave\\test\\build\\tests\\web-platform\\runtests.py', '--log-raw=-', '--log-raw=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_raw.log', '--log-errorsummary=C:\\slave\\test\\build\\blobber_upload_dir\\wpt_errorsummary.log', '--binary=C:\\slave\\test\\build\\application\\firefox\\firefox.exe', '--symbols-path=https://queue.taskcluster.net/v1/task/LAFBvWymTAKz2QA-a8Zltg/artifacts/public/build/firefox-52.0a2.en-US.win64.crashreporter-symbols.zip', '--stackwalk-binary=C:\\slave\\test\\build\\win32-minidump_stackwalk.exe', '--stackfix-dir=C:\\slave\\test\\build\\tests\\bin', '--test-type=testharness', '--disable-e10s', '--total-chunks=10', '--this-chunk=9', '--prefs-root=C:\\slave\\test\\build\\tests\\web-platform/prefs', '--processes=1', '--config=C:\\slave\\test\\build\\tests\\web-platform/wptrunner.ini', '--ca-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/cacert.pem', '--host-key-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.key', '--host-cert-path=C:\\slave\\test\\build\\tests\\web-platform/certs/web-platform.test.pem', '--certutil-binary=C:\\slave\\test\\build\\tests/bin/certutil'] with output_timeout 1000
ProcessManager NOT managing child processes
ProcessManager UNABLE to use job objects to manage child processes
13:23:51 INFO - STDERR: C:\slave\test\build\venv\lib\site-packages\mozrunner\utils.py:18: UserWarning: Module wptserve was already imported from C:\slave\test\build\tests\web-platform\tests\tools\wptserve\wptserve\__init__.py, but c:\slave\test\build\venv\lib\site-packages is being added to sys.path
13:23:51 INFO - import pkg_resources
13:23:51 INFO - STDERR: Opening manifest at C:\slave\test\build\tests\web-platform\meta\MANIFEST.json
13:23:51 INFO - STDERR: Opening manifest at C:\slave\test\build\tests\web-platform\mozilla\meta\MANIFEST.json
13:23:58 INFO - Using 1 client processes
13:24:00 INFO - SUITE-START | Running 829 tests
13:24:00 INFO - Running testharness tests
13:24:00 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/pbkdf2.worker
13:24:00 INFO - TEST-SKIP | /WebCryptoAPI/derive_bits_keys/pbkdf2.worker | took 0ms
13:24:00 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_pbkdf2.html
13:24:00 INFO - TEST-SKIP | /WebCryptoAPI/derive_bits_keys/test_pbkdf2.html | took 0ms
13:24:00 INFO - TEST-START | /XMLHttpRequest/send-redirect-post-upload.htm
13:24:00 INFO - TEST-SKIP | /XMLHttpRequest/send-redirect-post-upload.htm | took 1ms
13:24:00 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-default-namespace.html
13:24:00 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-default-namespace.html | took 0ms
13:24:00 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-duplicate-definition.html
13:24:00 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-duplicate-definition.html | took 0ms
13:24:00 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-invalid-type.html
13:24:00 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-invalid-type.html | took 0ms
13:24:00 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-local-name-lowercased.html
13:24:00 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-local-name-lowercased.html | took 0ms
13:24:00 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-name-is-null.html
13:24:00 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-name-is-null.html | took 0ms
13:24:00 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-no-interface-for-name.html
13:24:00 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-no-interface-for-name.html | took 0ms
13:24:00 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace-name-is-null.html
13:24:00 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace-name-is-null.html | took 0ms
13:24:00 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace.html
13:24:00 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-svg-namespace.html | took 0ms
13:24:00 INFO - TEST-START | /custom-elements/v0/registering/definition-construction-algorithm-type-name-lowercased.html
13:24:00 INFO - TEST-SKIP | /custom-elements/v0/registering/definition-construction-algorithm-type-name-lowercased.html | took 0ms
13:24:00 INFO - TEST-START | /custom-elements/v0/registering/element-registration-algorithm-no-registry.html
13:24:00 INFO - TEST-SKIP | /custom-elements/v0/registering/element-registration-algorithm-no-registry.html | took 0ms
13:24:00 INFO - TEST-START | /custom-elements/v0/registering/unresolved-elements-interface-html-element.html
13:24:00 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-elements-interface-html-element.html | took 1ms
13:24:00 INFO - TEST-START | /custom-elements/v0/registering/unresolved-elements-interface-html-unknown-element.html
13:24:00 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-elements-interface-html-unknown-element.html | took 0ms
13:24:00 INFO - TEST-START | /custom-elements/v0/registering/unresolved-elements-interface-svg-element.html
13:24:00 INFO - TEST-SKIP | /custom-elements/v0/registering/unresolved-elements-interface-svg-element.html | took 1ms
13:24:00 INFO - TEST-START | /dom/nodes/Document-contentType/contentType/contenttype_bmp.html
13:24:00 INFO - TEST-SKIP | /dom/nodes/Document-contentType/contentType/contenttype_bmp.html | took 0ms
13:24:00 INFO - TEST-START | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_1.html
13:24:00 INFO - TEST-SKIP | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_1.html | took 0ms
13:24:00 INFO - TEST-START | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_2.html
13:24:00 INFO - TEST-SKIP | /html/browsers/history/the-history-interface/traverse_the_history_write_onload_2.html | took 0ms
13:24:00 INFO - TEST-START | /referrer-policy/generic/subresource-test/area-navigate.html
13:24:00 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/area-navigate.html | took 0ms
13:24:00 INFO - TEST-START | /referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html
13:24:00 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/attr-referrer-invalid-value.html | took 0ms
13:24:00 INFO - TEST-START | /referrer-policy/generic/subresource-test/fetch-messaging.html
13:24:00 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/fetch-messaging.html | took 0ms
13:24:00 INFO - TEST-START | /referrer-policy/generic/subresource-test/iframe-messaging.html
13:24:00 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/iframe-messaging.html | took 0ms
13:24:00 INFO - TEST-START | /referrer-policy/generic/subresource-test/image-decoding.html
13:24:00 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/image-decoding.html | took 0ms
13:24:00 INFO - TEST-START | /referrer-policy/generic/subresource-test/link-navigate.html
13:24:00 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/link-navigate.html | took 1ms
13:24:00 INFO - TEST-START | /referrer-policy/generic/subresource-test/script-messaging.html
13:24:00 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/script-messaging.html | took 0ms
13:24:00 INFO - TEST-START | /referrer-policy/generic/subresource-test/worker-messaging.html
13:24:00 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/worker-messaging.html | took 1ms
13:24:00 INFO - TEST-START | /referrer-policy/generic/subresource-test/xhr-messaging.html
13:24:00 INFO - TEST-SKIP | /referrer-policy/generic/subresource-test/xhr-messaging.html | took 50ms
13:24:00 INFO - TEST-START | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html
13:24:00 INFO - TEST-SKIP | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.keep-origin-redirect.http.html | took 1ms
13:24:00 INFO - TEST-START | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html
13:24:00 INFO - TEST-SKIP | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.no-redirect.http.html | took 0ms
13:24:00 INFO - TEST-START | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html
13:24:00 INFO - TEST-SKIP | /referrer-policy/no-referrer-when-downgrade/meta-referrer/same-origin/http-https/img-tag/upgrade-protocol.swap-origin-redirect.http.html | took 0ms
13:24:00 INFO - TEST-START | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html
13:24:00 INFO - TEST-SKIP | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html | took 1ms
13:24:00 INFO - TEST-START | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html
13:24:00 INFO - TEST-SKIP | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html | took 1ms
13:24:00 INFO - TEST-START | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html
13:24:00 INFO - TEST-SKIP | /referrer-policy/origin-when-cross-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html | took 0ms
13:24:00 INFO - TEST-START | /service-workers/service-worker/appcache-ordering-main.https.html
13:24:00 INFO - TEST-SKIP | /service-workers/service-worker/appcache-ordering-main.https.html | took 0ms
13:24:00 INFO - TEST-START | /service-workers/service-worker/resource-timing.https.html
13:24:00 INFO - TEST-SKIP | /service-workers/service-worker/resource-timing.https.html | took 0ms
13:24:00 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat3-construction.html
13:24:00 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat3-construction.html | took 0ms
13:24:00 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat4-to-mat3.html
13:24:00 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/matrices/glsl-mat4-to-mat3.html | took 0ms
13:24:00 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_field.vert.html
13:24:00 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_field.vert.html | took 0ms
13:24:00 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_function.vert.html
13:24:00 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_function.vert.html | took 0ms
13:24:00 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_struct.vert.html
13:24:00 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_struct.vert.html | took 1ms
13:24:00 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_variable.vert.html
13:24:00 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/_webgl_variable.vert.html | took 0ms
13:24:00 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_field.vert.html
13:24:00 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_field.vert.html | took 0ms
13:24:01 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_function.vert.html
13:24:01 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_function.vert.html | took 0ms
13:24:01 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_struct.vert.html
13:24:01 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_struct.vert.html | took 1ms
13:24:01 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_variable.vert.html
13:24:01 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/reserved/webgl_variable.vert.html | took 0ms
13:24:01 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord-xy-values.html
13:24:01 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord-xy-values.html | took 0ms
13:24:01 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord.html
13:24:01 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragcoord.html | took 0ms
13:24:01 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragdata-and-fragcolor.html
13:24:01 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-fragdata-and-fragcolor.html | took 0ms
13:24:01 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-frontfacing.html
13:24:01 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-frontfacing.html | took 0ms
13:24:01 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-pointcoord.html
13:24:01 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/gl-pointcoord.html | took 0ms
13:24:01 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/glsl/variables/glsl-built-ins.html
13:24:01 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/glsl/variables/glsl-built-ins.html | took 1ms
13:24:01 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_001_to_008.html
13:24:01 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_001_to_008.html | took 0ms
13:24:01 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_009_to_012.html
13:24:01 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/atan/atan_009_to_012.html | took 0ms
13:24:01 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_001_to_008.html
13:24:01 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_001_to_008.html | took 1ms
13:24:01 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_009_to_010.html
13:24:01 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/control_flow/control_flow_009_to_010.html | took 0ms
13:24:01 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_001_to_008.html
13:24:01 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_001_to_008.html | took 0ms
13:24:01 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_009_to_012.html
13:24:01 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/exp/exp_009_to_012.html | took 1ms
13:24:01 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/mat3/mat3_001_to_006.html
13:24:01 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/mat3/mat3_001_to_006.html | took 0ms
13:24:01 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/matrixCompMult/matrixCompMult_001_to_004.html
13:24:01 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/matrixCompMult/matrixCompMult_001_to_004.html | took 0ms
13:24:01 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/min/min_001_to_006.html
13:24:01 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/min/min_001_to_006.html | took 1ms
13:24:01 INFO - TEST-START | /webgl/conformance-1.0.3/conformance/ogles/GL/step/step_001_to_006.html
13:24:01 INFO - TEST-SKIP | /webgl/conformance-1.0.3/conformance/ogles/GL/step/step_001_to_006.html | took 0ms
13:24:01 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/001.html
13:24:01 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/001.html | took 1ms
13:24:01 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/001.html?wss
13:24:01 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/001.html?wss | took 0ms
13:24:01 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/002.html
13:24:01 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/002.html | took 0ms
13:24:01 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/002.html?wss
13:24:01 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/002.html?wss | took 0ms
13:24:01 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/003.html?wss
13:24:01 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/003.html?wss | took 1ms
13:24:01 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/003.html
13:24:01 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/003.html | took 0ms
13:24:01 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/004.html?wss
13:24:01 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/004.html?wss | took 1ms
13:24:01 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/004.html
13:24:01 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/004.html | took 0ms
13:24:01 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/005.html?wss
13:24:01 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/005.html?wss | took 0ms
13:24:01 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/005.html
13:24:01 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/005.html | took 0ms
13:24:01 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/006.html
13:24:01 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/006.html | took 1ms
13:24:01 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/006.html?wss
13:24:01 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/006.html?wss | took 0ms
13:24:01 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/007.html
13:24:01 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/007.html | took 0ms
13:24:01 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/007.html?wss
13:24:01 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/007.html?wss | took 0ms
13:24:01 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/008.html?wss
13:24:01 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/008.html?wss | took 0ms
13:24:01 INFO - TEST-START | /websockets/interfaces/WebSocket/readyState/008.html
13:24:01 INFO - TEST-SKIP | /websockets/interfaces/WebSocket/readyState/008.html | took 1ms
13:24:01 INFO - Setting up ssl
13:24:02 INFO - PROCESS | certutil |
13:24:02 INFO - PROCESS | certutil |
13:24:02 INFO - PROCESS | certutil |
13:24:02 INFO - Certificate Nickname Trust Attributes
13:24:02 INFO - SSL,S/MIME,JAR/XPI
13:24:02 INFO -
13:24:02 INFO - web-platform-tests CT,,
13:24:02 INFO -
13:24:02 INFO - Application command: C:\slave\test\build\application\firefox\firefox.exe -marionette about:blank -profile c:\users\cltbld~1.t-w\appdata\local\temp\tmpqxpgqd.mozrunner
13:24:02 INFO - Starting runner
13:24:02 INFO - PROCESS | 3632 | [3632] WARNING: Failed to load startupcache file correctly, removing!: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/startupcache/StartupCache.cpp, line 219
13:24:02 INFO - PROCESS | 3632 | [3632] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x80004005: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/xpcom/base/nsSystemInfo.cpp, line 116
13:24:02 INFO - PROCESS | 3632 | [3632] WARNING: This method is lossy. Use GetCanonicalPath !: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/xpcom/io/nsLocalFileWin.cpp, line 3576
13:24:04 INFO - PROCESS | 3632 | 1483651444579 Marionette DEBUG Marionette enabled via build flag and pref
13:24:05 INFO - PROCESS | 3632 | ++DOCSHELL 0000007518240000 == 1 [pid = 3632] [id = 1]
13:24:05 INFO - PROCESS | 3632 | ++DOMWINDOW == 1 (0000007526037000) [pid = 3632] [serial = 1] [outer = 0000000000000000]
13:24:05 INFO - PROCESS | 3632 | ++DOMWINDOW == 2 (0000007526038000) [pid = 3632] [serial = 2] [outer = 0000007526037000]
13:24:06 INFO - PROCESS | 3632 | ++DOCSHELL 000000752602F800 == 2 [pid = 3632] [id = 2]
13:24:06 INFO - PROCESS | 3632 | ++DOMWINDOW == 3 (000000752949B800) [pid = 3632] [serial = 3] [outer = 0000000000000000]
13:24:06 INFO - PROCESS | 3632 | ++DOMWINDOW == 4 (000000752949C800) [pid = 3632] [serial = 4] [outer = 000000752949B800]
13:24:06 INFO - PROCESS | 3632 | 1483651446676 Marionette INFO Listening on port 2828
13:24:08 INFO - PROCESS | 3632 | 1483651448756 Marionette DEBUG Marionette enabled via command-line flag
13:24:08 INFO - PROCESS | 3632 | ++DOCSHELL 000000752A54A000 == 3 [pid = 3632] [id = 3]
13:24:08 INFO - PROCESS | 3632 | ++DOMWINDOW == 5 (000000752A72D800) [pid = 3632] [serial = 5] [outer = 0000000000000000]
13:24:08 INFO - PROCESS | 3632 | ++DOMWINDOW == 6 (000000752A72E800) [pid = 3632] [serial = 6] [outer = 000000752A72D800]
13:24:09 INFO - PROCESS | 3632 | ++DOMWINDOW == 7 (000000752A553800) [pid = 3632] [serial = 7] [outer = 000000752949B800]
13:24:09 INFO - PROCESS | 3632 | 1483651449090 Marionette DEBUG Accepted connection conn0 from 127.0.0.1:49311
13:24:09 INFO - PROCESS | 3632 | 1483651449096 Marionette DEBUG Accepted connection conn1 from 127.0.0.1:49312
13:24:09 INFO - PROCESS | 3632 | 1483651449118 Marionette DEBUG Accepted connection conn2 from 127.0.0.1:49313
13:24:09 INFO - PROCESS | 3632 | 1483651449124 Marionette DEBUG Accepted connection conn3 from 127.0.0.1:49314
13:24:09 INFO - PROCESS | 3632 | 1483651449157 Marionette DEBUG Accepted connection conn4 from 127.0.0.1:49315
13:24:09 INFO - PROCESS | 3632 | 1483651449160 Marionette DEBUG Closed connection conn0
13:24:09 INFO - PROCESS | 3632 | 1483651449163 Marionette DEBUG Closed connection conn1
13:24:09 INFO - PROCESS | 3632 | 1483651449168 Marionette DEBUG Closed connection conn2
13:24:09 INFO - PROCESS | 3632 | 1483651449171 Marionette DEBUG Closed connection conn3
13:24:09 INFO - PROCESS | 3632 | 1483651449330 Marionette DEBUG Closed connection conn4
13:24:09 INFO - PROCESS | 3632 | 1483651449335 Marionette DEBUG Accepted connection conn5 from 127.0.0.1:49316
13:24:09 INFO - PROCESS | 3632 | 1483651449348 Marionette DEBUG Closed connection conn5
13:24:09 INFO - PROCESS | 3632 | 1483651449352 Marionette DEBUG Accepted connection conn6 from 127.0.0.1:49317
13:24:09 INFO - PROCESS | 3632 | ++DOCSHELL 0000007526036800 == 4 [pid = 3632] [id = 4]
13:24:09 INFO - PROCESS | 3632 | ++DOMWINDOW == 8 (000000752B864800) [pid = 3632] [serial = 8] [outer = 0000000000000000]
13:24:09 INFO - PROCESS | 3632 | ++DOMWINDOW == 9 (000000752DE90800) [pid = 3632] [serial = 9] [outer = 000000752B864800]
13:24:09 INFO - PROCESS | 3632 | ++DOMWINDOW == 10 (000000752DE9B000) [pid = 3632] [serial = 10] [outer = 000000752B864800]
13:24:09 INFO - PROCESS | 3632 | 1483651449563 Marionette TRACE conn6 -> [0,1,"newSession",{"sessionId":null,"capabilities":null}]
13:24:09 INFO - PROCESS | 3632 | 1483651449569 Marionette CONFIG Changing capabilities: {"browserName":"firefox","browserVersion":"52.0a2","platformName":"windows_nt","platformVersion":"6.2","acceptInsecureCerts":false,"rotatable":false,"proxy":{},"specificationLevel":0,"moz:processID":3632,"moz:profile":"c:\\users\\cltbld~1.t-w\\appdata\\local\\temp\\tmpqxpgqd.mozrunner","moz:accessibilityChecks":false}
13:24:10 INFO - PROCESS | 3632 | [3632] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1566
13:24:10 INFO - PROCESS | 3632 | [3632] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1566
13:24:10 INFO - PROCESS | 3632 | [3632] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
13:24:11 INFO - PROCESS | 3632 | [3632] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
13:24:11 INFO - PROCESS | 3632 | [3632] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
13:24:11 INFO - PROCESS | 3632 | [3632] WARNING: NS_ENSURE_TRUE(layerManager) failed: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/media/MediaDecoder.cpp, line 301
13:24:11 INFO - PROCESS | 3632 | ++DOCSHELL 0000007530B64800 == 5 [pid = 3632] [id = 5]
13:24:11 INFO - PROCESS | 3632 | ++DOMWINDOW == 11 (0000007530B81000) [pid = 3632] [serial = 11] [outer = 0000000000000000]
13:24:11 INFO - PROCESS | 3632 | ++DOCSHELL 0000007530B82800 == 6 [pid = 3632] [id = 6]
13:24:11 INFO - PROCESS | 3632 | ++DOMWINDOW == 12 (000000752FE50800) [pid = 3632] [serial = 12] [outer = 0000000000000000]
13:24:12 INFO - PROCESS | 3632 | ++DOCSHELL 0000007531FD9800 == 7 [pid = 3632] [id = 7]
13:24:12 INFO - PROCESS | 3632 | ++DOMWINDOW == 13 (0000007531FDA000) [pid = 3632] [serial = 13] [outer = 0000000000000000]
13:24:12 INFO - PROCESS | 3632 | ++DOMWINDOW == 14 (000000753228D000) [pid = 3632] [serial = 14] [outer = 0000007531FDA000]
13:24:12 INFO - PROCESS | 3632 | ++DOMWINDOW == 15 (0000007532729800) [pid = 3632] [serial = 15] [outer = 0000007530B81000]
13:24:12 INFO - PROCESS | 3632 | ++DOMWINDOW == 16 (000000753272C800) [pid = 3632] [serial = 16] [outer = 000000752FE50800]
13:24:12 INFO - PROCESS | 3632 | ++DOMWINDOW == 17 (0000007532731000) [pid = 3632] [serial = 17] [outer = 0000007531FDA000]
13:24:13 INFO - PROCESS | 3632 | 1483651453462 Marionette DEBUG loaded listener.js
13:24:14 INFO - PROCESS | 3632 | ++DOMWINDOW == 18 (0000007534E1F000) [pid = 3632] [serial = 18] [outer = 0000007531FDA000]
13:24:14 INFO - PROCESS | 3632 | 1483651454625 Marionette TRACE conn6 <- [1,1,null,{"sessionId":"8c781f92-6b2c-49bb-9a3d-44d70f5a6916","capabilities":{"browserName":"firefox","browserVersion":"52.0a2","platformName":"windows_nt","platformVersion":"6.2","acceptInsecureCerts":false,"rotatable":false,"proxy":{},"specificationLevel":0,"moz:processID":3632,"moz:profile":"c:\\users\\cltbld~1.t-w\\appdata\\local\\temp\\tmpqxpgqd.mozrunner","moz:accessibilityChecks":false}}]
13:24:14 INFO - PROCESS | 3632 | 1483651454984 Marionette TRACE conn6 -> [0,2,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":139}]
13:24:15 INFO - PROCESS | 3632 | 1483651455042 Marionette TRACE conn6 <- [1,2,null,{"value":null}]
13:24:15 INFO - PROCESS | 3632 | 1483651455157 Marionette TRACE conn6 -> [0,3,"getWindowHandle",null]
13:24:15 INFO - PROCESS | 3632 | 1483651455160 Marionette TRACE conn6 <- [1,3,null,{"value":"13"}]
13:24:15 INFO - PROCESS | 3632 | 1483651455165 Marionette TRACE conn6 -> [0,4,"get",{"url":"http://web-platform.test:8000/testharness_runner.html"}]
13:24:15 INFO - PROCESS | 3632 | [3632] WARNING: Could not get disk status from nsIDiskSpaceWatcher: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/uriloader/prefetch/nsOfflineCacheUpdateService.cpp, line 283
13:24:16 INFO - PROCESS | 3632 | ++DOMWINDOW == 19 (0000007523F53000) [pid = 3632] [serial = 19] [outer = 0000007531FDA000]
13:24:16 INFO - PROCESS | 3632 | --DOCSHELL 0000007518240000 == 6 [pid = 3632] [id = 1]
13:24:16 INFO - PROCESS | 3632 | 1483651456468 Marionette TRACE conn6 <- [1,4,null,{}]
13:24:16 INFO - PROCESS | 3632 | 1483651456554 Marionette TRACE conn6 -> [0,5,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"document.title = 'MainThread'","sandbox":"default","line":152}]
13:24:16 INFO - PROCESS | 3632 | 1483651456597 Marionette TRACE conn6 <- [1,5,null,{"value":null}]
13:24:16 INFO - PROCESS | 3632 | 1483651456641 Marionette TRACE conn6 -> [0,6,"getWindowHandle",null]
13:24:16 INFO - PROCESS | 3632 | 1483651456646 Marionette TRACE conn6 <- [1,6,null,{"value":"13"}]
13:24:16 INFO - TEST-START | /2dcontext/image-smoothing/imagesmoothing.html
13:24:16 INFO - PROCESS | 3632 | 1483651456703 Marionette TRACE conn6 -> [0,7,"setTimeouts",{"script":35000}]
13:24:16 INFO - PROCESS | 3632 | 1483651456708 Marionette TRACE conn6 <- [1,7,null,{}]
13:24:16 INFO - PROCESS | 3632 | 1483651456742 Marionette TRACE conn6 -> [0,8,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:24:16 INFO - PROCESS | 3632 | 1483651456778 Marionette TRACE conn6 <- [1,8,null,{"value":null}]
13:24:16 INFO - PROCESS | 3632 | 1483651456811 Marionette TRACE conn6 -> [0,9,"getWindowHandles",null]
13:24:16 INFO - PROCESS | 3632 | 1483651456818 Marionette TRACE conn6 <- [1,9,null,["13"]]
13:24:16 INFO - PROCESS | 3632 | 1483651456840 Marionette TRACE conn6 -> [0,10,"switchToWindow",{"name":"13"}]
13:24:16 INFO - PROCESS | 3632 | 1483651456846 Marionette TRACE conn6 <- [1,10,null,{}]
13:24:16 INFO - PROCESS | 3632 | 1483651456860 Marionette TRACE conn6 -> [0,11,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/2dcontext/image-smoothing/imagesmoothing.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/2dcontext/image-smoothing/imagesmoothing.html\", \"82719711-f12c-4532-af7b-31974de52539\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:24:16 INFO - PROCESS | 3632 | ++DOCSHELL 000000752B263000 == 7 [pid = 3632] [id = 8]
13:24:16 INFO - PROCESS | 3632 | ++DOMWINDOW == 20 (000000752B263800) [pid = 3632] [serial = 20] [outer = 0000000000000000]
13:24:16 INFO - PROCESS | 3632 | ++DOMWINDOW == 21 (000000752B267000) [pid = 3632] [serial = 21] [outer = 000000752B263800]
13:24:16 INFO - PROCESS | 3632 | 1483651456938 Marionette DEBUG loaded listener.js
13:24:17 INFO - PROCESS | 3632 | ++DOMWINDOW == 22 (000000752B26B800) [pid = 3632] [serial = 22] [outer = 000000752B263800]
13:24:17 INFO - PROCESS | 3632 | ++DOCSHELL 000000752B260800 == 8 [pid = 3632] [id = 9]
13:24:17 INFO - PROCESS | 3632 | ++DOMWINDOW == 23 (000000752B266000) [pid = 3632] [serial = 23] [outer = 0000000000000000]
13:24:17 INFO - PROCESS | 3632 | ++DOMWINDOW == 24 (000000752FE5C000) [pid = 3632] [serial = 24] [outer = 000000752B266000]
13:24:17 INFO - PROCESS | 3632 | 1483651457307 Marionette DEBUG loaded listener.js
13:24:17 INFO - PROCESS | 3632 | ++DOMWINDOW == 25 (00000075318E4000) [pid = 3632] [serial = 25] [outer = 000000752B266000]
13:24:17 INFO - PROCESS | 3632 | 1483651457738 Marionette TRACE conn6 <- [1,11,null,{"value":["/2dcontext/image-smoothing/imagesmoothing.html",0,null,null,[["When the canvas context is created, imageSmoothingEnabled must be set to true.",0,null,null],["On getting imageSmoothingEnabled, the user agent must return the last value it was set to.",0,null,null],["Test that image smoothing is actually on by default and just the attribute value.",0,null,null],["Test that image smoothing works when imageSmoothingEnabled is set to true",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with drawImage().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with fillRect and createPattern().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with fill() and createPattern().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) works with stroke() and createPattern().",0,null,null],["Test that imageSmoothingEnabled = false (nearest-neighbor interpolation) still works after repaints.",0,null,null]]]}]
13:24:17 INFO - .........
13:24:17 INFO - TEST-OK | /2dcontext/image-smoothing/imagesmoothing.html | took 1132ms
13:24:17 INFO - PROCESS | 3632 | 1483651457852 Marionette TRACE conn6 -> [0,12,"getWindowHandle",null]
13:24:17 INFO - PROCESS | 3632 | 1483651457855 Marionette TRACE conn6 <- [1,12,null,{"value":"13"}]
13:24:17 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/ecdh_bits.worker
13:24:18 INFO - PROCESS | 3632 | 1483651458100 Marionette TRACE conn6 -> [0,13,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:24:18 INFO - PROCESS | 3632 | 1483651458309 Marionette TRACE conn6 <- [1,13,null,{"value":null}]
13:24:18 INFO - PROCESS | 3632 | 1483651458376 Marionette TRACE conn6 -> [0,14,"getWindowHandles",null]
13:24:18 INFO - PROCESS | 3632 | 1483651458382 Marionette TRACE conn6 <- [1,14,null,["13"]]
13:24:18 INFO - PROCESS | 3632 | 1483651458420 Marionette TRACE conn6 -> [0,15,"switchToWindow",{"name":"13"}]
13:24:18 INFO - PROCESS | 3632 | 1483651458429 Marionette TRACE conn6 <- [1,15,null,{}]
13:24:18 INFO - PROCESS | 3632 | 1483651458546 Marionette TRACE conn6 -> [0,16,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker\", \"82719711-f12c-4532-af7b-31974de52539\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:24:18 INFO - PROCESS | 3632 | ++DOCSHELL 0000007532718800 == 9 [pid = 3632] [id = 10]
13:24:18 INFO - PROCESS | 3632 | ++DOMWINDOW == 26 (0000007532719800) [pid = 3632] [serial = 26] [outer = 0000000000000000]
13:24:18 INFO - PROCESS | 3632 | ++DOMWINDOW == 27 (0000007532721800) [pid = 3632] [serial = 27] [outer = 0000007532719800]
13:24:18 INFO - PROCESS | 3632 | 1483651458616 Marionette DEBUG loaded listener.js
13:24:18 INFO - PROCESS | 3632 | ++DOMWINDOW == 28 (0000007532CA1000) [pid = 3632] [serial = 28] [outer = 0000007532719800]
13:24:18 INFO - PROCESS | 3632 | [3632] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
13:24:19 INFO - PROCESS | 3632 | ++DOCSHELL 0000007535C89000 == 10 [pid = 3632] [id = 11]
13:24:19 INFO - PROCESS | 3632 | ++DOMWINDOW == 29 (0000007535C89800) [pid = 3632] [serial = 29] [outer = 0000000000000000]
13:24:19 INFO - PROCESS | 3632 | ++DOMWINDOW == 30 (0000007536103800) [pid = 3632] [serial = 30] [outer = 0000007535C89800]
13:24:19 INFO - PROCESS | 3632 | ++DOMWINDOW == 31 (00000075322A5800) [pid = 3632] [serial = 31] [outer = 0000007535C89800]
13:24:19 INFO - PROCESS | 3632 | ++DOCSHELL 0000007522FC5000 == 11 [pid = 3632] [id = 12]
13:24:19 INFO - PROCESS | 3632 | ++DOMWINDOW == 32 (00000075237F2800) [pid = 3632] [serial = 32] [outer = 0000000000000000]
13:24:19 INFO - PROCESS | 3632 | ++DOMWINDOW == 33 (0000007523F52000) [pid = 3632] [serial = 33] [outer = 00000075237F2800]
13:24:19 INFO - PROCESS | 3632 | ++DOMWINDOW == 34 (00000075242C6000) [pid = 3632] [serial = 34] [outer = 00000075237F2800]
13:24:20 INFO - PROCESS | 3632 | --DOCSHELL 0000007526036800 == 10 [pid = 3632] [id = 4]
13:24:26 INFO - PROCESS | 3632 | --DOCSHELL 000000752B263000 == 9 [pid = 3632] [id = 8]
13:24:27 INFO - PROCESS | 3632 | [3632] WARNING: NS_ENSURE_TRUE(layerManager) failed: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/media/MediaDecoder.cpp, line 301
13:24:27 INFO - PROCESS | 3632 | [3632] WARNING: NS_ENSURE_TRUE(layerManager) failed: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/media/MediaDecoder.cpp, line 301
13:24:27 INFO - PROCESS | 3632 | --DOMWINDOW == 33 (000000752B864800) [pid = 3632] [serial = 8] [outer = 0000000000000000] [url = chrome://gfxsanity/content/sanitytest.html]
13:24:27 INFO - PROCESS | 3632 | --DOMWINDOW == 32 (0000007526037000) [pid = 3632] [serial = 1] [outer = 0000000000000000] [url = chrome://gfxsanity/content/sanityparent.html]
13:24:32 INFO - PROCESS | 3632 | --DOMWINDOW == 31 (000000753228D000) [pid = 3632] [serial = 14] [outer = 0000000000000000] [url = about:blank]
13:24:32 INFO - PROCESS | 3632 | --DOMWINDOW == 30 (000000752DE90800) [pid = 3632] [serial = 9] [outer = 0000000000000000] [url = about:blank]
13:24:32 INFO - PROCESS | 3632 | --DOMWINDOW == 29 (000000752DE9B000) [pid = 3632] [serial = 10] [outer = 0000000000000000] [url = chrome://gfxsanity/content/sanitytest.html]
13:24:32 INFO - PROCESS | 3632 | --DOMWINDOW == 28 (0000007526038000) [pid = 3632] [serial = 2] [outer = 0000000000000000] [url = about:blank]
13:24:32 INFO - PROCESS | 3632 | --DOMWINDOW == 27 (000000752949C800) [pid = 3632] [serial = 4] [outer = 0000000000000000] [url = about:blank]
13:24:32 INFO - PROCESS | 3632 | --DOMWINDOW == 26 (0000007532731000) [pid = 3632] [serial = 17] [outer = 0000000000000000] [url = about:blank]
13:24:32 INFO - PROCESS | 3632 | --DOMWINDOW == 25 (000000752FE5C000) [pid = 3632] [serial = 24] [outer = 0000000000000000] [url = about:blank]
13:24:32 INFO - PROCESS | 3632 | --DOMWINDOW == 24 (0000007523F52000) [pid = 3632] [serial = 33] [outer = 0000000000000000] [url = about:blank]
13:24:32 INFO - PROCESS | 3632 | --DOMWINDOW == 23 (0000007532721800) [pid = 3632] [serial = 27] [outer = 0000000000000000] [url = about:blank]
13:24:32 INFO - PROCESS | 3632 | --DOMWINDOW == 22 (000000752B267000) [pid = 3632] [serial = 21] [outer = 0000000000000000] [url = about:blank]
13:24:32 INFO - PROCESS | 3632 | --DOMWINDOW == 21 (0000007536103800) [pid = 3632] [serial = 30] [outer = 0000000000000000] [url = about:blank]
13:24:34 INFO - PROCESS | 3632 | --DOMWINDOW == 20 (000000752B263800) [pid = 3632] [serial = 20] [outer = 0000000000000000] [url = http://web-platform.test:8000/2dcontext/image-smoothing/imagesmoothing.html]
13:24:38 INFO - PROCESS | 3632 | --DOMWINDOW == 19 (000000752B26B800) [pid = 3632] [serial = 22] [outer = 0000000000000000] [url = about:blank]
13:24:48 INFO - PROCESS | 3632 | MARIONETTE LOG: INFO: Timeout fired
13:24:48 INFO - PROCESS | 3632 | 1483651488775 Marionette TRACE conn6 <- [1,16,null,{"value":["/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker",2,null,null,[]]}]
13:24:48 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/ecdh_bits.worker | took 30950ms
13:24:48 INFO - PROCESS | 3632 | 1483651488818 Marionette TRACE conn6 -> [0,17,"getWindowHandle",null]
13:24:48 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/ecdh_keys.worker
13:24:48 INFO - PROCESS | 3632 | 1483651488825 Marionette TRACE conn6 <- [1,17,null,{"value":"13"}]
13:24:48 INFO - PROCESS | 3632 | 1483651488833 Marionette TRACE conn6 -> [0,18,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:24:48 INFO - PROCESS | 3632 | 1483651488969 Marionette TRACE conn6 <- [1,18,null,{"value":null}]
13:24:49 INFO - PROCESS | 3632 | 1483651489001 Marionette TRACE conn6 -> [0,19,"getWindowHandles",null]
13:24:49 INFO - PROCESS | 3632 | 1483651489005 Marionette TRACE conn6 <- [1,19,null,["13"]]
13:24:49 INFO - PROCESS | 3632 | 1483651489010 Marionette TRACE conn6 -> [0,20,"switchToWindow",{"name":"13"}]
13:24:49 INFO - PROCESS | 3632 | 1483651489015 Marionette TRACE conn6 <- [1,20,null,{}]
13:24:49 INFO - PROCESS | 3632 | 1483651489021 Marionette TRACE conn6 -> [0,21,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker\", \"82719711-f12c-4532-af7b-31974de52539\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:24:49 INFO - PROCESS | 3632 | ++DOCSHELL 0000007526039800 == 10 [pid = 3632] [id = 13]
13:24:49 INFO - PROCESS | 3632 | ++DOMWINDOW == 20 (0000007526044000) [pid = 3632] [serial = 35] [outer = 0000000000000000]
13:24:49 INFO - PROCESS | 3632 | ++DOMWINDOW == 21 (0000007526313000) [pid = 3632] [serial = 36] [outer = 0000007526044000]
13:24:49 INFO - PROCESS | 3632 | 1483651489085 Marionette DEBUG loaded listener.js
13:24:49 INFO - PROCESS | 3632 | ++DOMWINDOW == 22 (000000752634D800) [pid = 3632] [serial = 37] [outer = 0000007526044000]
13:24:49 INFO - PROCESS | 3632 | [3632] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
13:24:49 INFO - PROCESS | 3632 | ++DOMWINDOW == 23 (000000752999A000) [pid = 3632] [serial = 38] [outer = 00000075237F2800]
13:24:58 INFO - PROCESS | 3632 | --DOCSHELL 0000007532718800 == 9 [pid = 3632] [id = 10]
13:25:00 INFO - PROCESS | 3632 | --DOMWINDOW == 22 (0000007532719800) [pid = 3632] [serial = 26] [outer = 0000000000000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_bits.worker]
13:25:06 INFO - PROCESS | 3632 | --DOMWINDOW == 21 (0000007532CA1000) [pid = 3632] [serial = 28] [outer = 0000000000000000] [url = about:blank]
13:25:06 INFO - PROCESS | 3632 | --DOMWINDOW == 20 (00000075242C6000) [pid = 3632] [serial = 34] [outer = 0000000000000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
13:25:06 INFO - PROCESS | 3632 | --DOMWINDOW == 19 (0000007526313000) [pid = 3632] [serial = 36] [outer = 0000000000000000] [url = about:blank]
13:25:19 INFO - PROCESS | 3632 | MARIONETTE LOG: INFO: Timeout fired
13:25:19 INFO - PROCESS | 3632 | 1483651519236 Marionette TRACE conn6 <- [1,21,null,{"value":["/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker",2,null,null,[]]}]
13:25:19 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/ecdh_keys.worker | took 30428ms
13:25:19 INFO - PROCESS | 3632 | 1483651519261 Marionette TRACE conn6 -> [0,22,"getWindowHandle",null]
13:25:19 INFO - PROCESS | 3632 | 1483651519265 Marionette TRACE conn6 <- [1,22,null,{"value":"13"}]
13:25:19 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/hkdf.worker
13:25:19 INFO - PROCESS | 3632 | 1483651519301 Marionette TRACE conn6 -> [0,23,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:25:19 INFO - PROCESS | 3632 | 1483651519430 Marionette TRACE conn6 <- [1,23,null,{"value":null}]
13:25:19 INFO - PROCESS | 3632 | 1483651519462 Marionette TRACE conn6 -> [0,24,"getWindowHandles",null]
13:25:19 INFO - PROCESS | 3632 | 1483651519465 Marionette TRACE conn6 <- [1,24,null,["13"]]
13:25:19 INFO - PROCESS | 3632 | 1483651519470 Marionette TRACE conn6 -> [0,25,"switchToWindow",{"name":"13"}]
13:25:19 INFO - PROCESS | 3632 | 1483651519475 Marionette TRACE conn6 <- [1,25,null,{}]
13:25:19 INFO - PROCESS | 3632 | 1483651519480 Marionette TRACE conn6 -> [0,26,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/hkdf.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker\", \"82719711-f12c-4532-af7b-31974de52539\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:25:19 INFO - PROCESS | 3632 | ++DOCSHELL 0000007526036800 == 10 [pid = 3632] [id = 14]
13:25:19 INFO - PROCESS | 3632 | ++DOMWINDOW == 20 (0000007526037000) [pid = 3632] [serial = 39] [outer = 0000000000000000]
13:25:19 INFO - PROCESS | 3632 | ++DOMWINDOW == 21 (0000007526313000) [pid = 3632] [serial = 40] [outer = 0000007526037000]
13:25:19 INFO - PROCESS | 3632 | 1483651519544 Marionette DEBUG loaded listener.js
13:25:19 INFO - PROCESS | 3632 | ++DOMWINDOW == 22 (0000007526350800) [pid = 3632] [serial = 41] [outer = 0000007526037000]
13:25:19 INFO - PROCESS | 3632 | [3632] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
13:25:34 INFO - PROCESS | 3632 | 1483651532847 Marionette TRACE conn6 <- [1,26,null,{"value":["/WebCryptoAPI/derive_bits_keys/hkdf.worker",0,null,null,[["short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["short derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["short derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["short derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,{},{}],["long derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,{},{}],["long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["long derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,{},{}],["long derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,{},{}],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with missing salt",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with missing info",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with null length",0,{},{}],["empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with missing salt",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with missing info",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with null length",0,{},{}],["empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,{},{}],["empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker.js:5:1\n"]]]}]
13:25:35 INFO - ............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
13:25:35 INFO - TEST-OK | /WebCryptoAPI/derive_bits_keys/hkdf.worker | took 15793ms
13:25:35 INFO - PROCESS | 3632 | 1483651535108 Marionette TRACE conn6 -> [0,27,"getWindowHandle",null]
13:25:35 INFO - PROCESS | 3632 | 1483651535114 Marionette TRACE conn6 <- [1,27,null,{"value":"13"}]
13:25:35 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html
13:25:35 INFO - PROCESS | 3632 | 1483651535124 Marionette TRACE conn6 -> [0,28,"setTimeouts",{"script":185000}]
13:25:35 INFO - PROCESS | 3632 | 1483651535130 Marionette TRACE conn6 <- [1,28,null,{}]
13:25:35 INFO - PROCESS | 3632 | 1483651535137 Marionette TRACE conn6 -> [0,29,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:25:35 INFO - PROCESS | 3632 | 1483651535312 Marionette TRACE conn6 <- [1,29,null,{"value":null}]
13:25:35 INFO - PROCESS | 3632 | 1483651535362 Marionette TRACE conn6 -> [0,30,"getWindowHandles",null]
13:25:35 INFO - PROCESS | 3632 | 1483651535366 Marionette TRACE conn6 <- [1,30,null,["13"]]
13:25:35 INFO - PROCESS | 3632 | 1483651535373 Marionette TRACE conn6 -> [0,31,"switchToWindow",{"name":"13"}]
13:25:35 INFO - PROCESS | 3632 | 1483651535382 Marionette TRACE conn6 <- [1,31,null,{}]
13:25:35 INFO - PROCESS | 3632 | 1483651535435 Marionette TRACE conn6 -> [0,32,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html\", \"82719711-f12c-4532-af7b-31974de52539\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:25:35 INFO - PROCESS | 3632 | ++DOCSHELL 000000753BE54800 == 11 [pid = 3632] [id = 15]
13:25:35 INFO - PROCESS | 3632 | ++DOMWINDOW == 23 (000000753BE55000) [pid = 3632] [serial = 42] [outer = 0000000000000000]
13:25:35 INFO - PROCESS | 3632 | ++DOMWINDOW == 24 (000000753BE59000) [pid = 3632] [serial = 43] [outer = 000000753BE55000]
13:25:35 INFO - PROCESS | 3632 | 1483651535512 Marionette DEBUG loaded listener.js
13:25:35 INFO - PROCESS | 3632 | ++DOMWINDOW == 25 (000000753BE5D800) [pid = 3632] [serial = 44] [outer = 000000753BE55000]
13:25:38 INFO - PROCESS | 3632 | --DOMWINDOW == 24 (0000007526044000) [pid = 3632] [serial = 35] [outer = 0000000000000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/ecdh_keys.worker]
13:25:44 INFO - PROCESS | 3632 | --DOMWINDOW == 23 (0000007526313000) [pid = 3632] [serial = 40] [outer = 0000000000000000] [url = about:blank]
13:25:44 INFO - PROCESS | 3632 | --DOMWINDOW == 22 (000000752634D800) [pid = 3632] [serial = 37] [outer = 0000000000000000] [url = about:blank]
13:25:46 INFO - PROCESS | 3632 | --DOMWINDOW == 21 (0000007526037000) [pid = 3632] [serial = 39] [outer = 0000000000000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.worker]
13:25:49 INFO - PROCESS | 3632 | ++DOMWINDOW == 22 (0000007522D32800) [pid = 3632] [serial = 45] [outer = 00000075237F2800]
13:25:52 INFO - PROCESS | 3632 | --DOCSHELL 0000007526039800 == 10 [pid = 3632] [id = 13]
13:25:52 INFO - PROCESS | 3632 | --DOCSHELL 0000007526036800 == 9 [pid = 3632] [id = 14]
13:25:52 INFO - PROCESS | 3632 | --DOMWINDOW == 21 (0000007526350800) [pid = 3632] [serial = 41] [outer = 0000000000000000] [url = about:blank]
13:25:52 INFO - PROCESS | 3632 | --DOMWINDOW == 20 (000000753BE59000) [pid = 3632] [serial = 43] [outer = 0000000000000000] [url = about:blank]
13:25:59 INFO - PROCESS | 3632 | --DOMWINDOW == 19 (000000752999A000) [pid = 3632] [serial = 38] [outer = 0000000000000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
13:27:19 INFO - PROCESS | 3632 | ++DOMWINDOW == 20 (0000007522D86000) [pid = 3632] [serial = 46] [outer = 00000075237F2800]
13:27:34 INFO - PROCESS | 3632 | --DOMWINDOW == 19 (0000007522D32800) [pid = 3632] [serial = 45] [outer = 0000000000000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
13:28:35 INFO - PROCESS | 3632 | MARIONETTE LOG: INFO: Timeout fired
13:28:35 INFO - PROCESS | 3632 | 1483651715638 Marionette TRACE conn6 <- [1,32,null,{"value":["/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html",2,null,null,[]]}]
13:28:35 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html | took 180578ms
13:28:35 INFO - PROCESS | 3632 | 1483651715707 Marionette TRACE conn6 -> [0,33,"getWindowHandle",null]
13:28:35 INFO - PROCESS | 3632 | 1483651715713 Marionette TRACE conn6 <- [1,33,null,{"value":"13"}]
13:28:35 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html
13:28:35 INFO - PROCESS | 3632 | 1483651715723 Marionette TRACE conn6 -> [0,34,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:28:35 INFO - PROCESS | 3632 | 1483651715901 Marionette TRACE conn6 <- [1,34,null,{"value":null}]
13:28:35 INFO - PROCESS | 3632 | 1483651715951 Marionette TRACE conn6 -> [0,35,"getWindowHandles",null]
13:28:35 INFO - PROCESS | 3632 | 1483651715957 Marionette TRACE conn6 <- [1,35,null,["13"]]
13:28:35 INFO - PROCESS | 3632 | 1483651715962 Marionette TRACE conn6 -> [0,36,"switchToWindow",{"name":"13"}]
13:28:35 INFO - PROCESS | 3632 | 1483651715970 Marionette TRACE conn6 <- [1,36,null,{}]
13:28:35 INFO - PROCESS | 3632 | 1483651715975 Marionette TRACE conn6 -> [0,37,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html\", \"82719711-f12c-4532-af7b-31974de52539\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:28:36 INFO - PROCESS | 3632 | ++DOCSHELL 00000075242D9000 == 10 [pid = 3632] [id = 16]
13:28:36 INFO - PROCESS | 3632 | ++DOMWINDOW == 20 (00000075249C6000) [pid = 3632] [serial = 47] [outer = 0000000000000000]
13:28:36 INFO - PROCESS | 3632 | ++DOMWINDOW == 21 (0000007524E6A000) [pid = 3632] [serial = 48] [outer = 00000075249C6000]
13:28:36 INFO - PROCESS | 3632 | 1483651716097 Marionette DEBUG loaded listener.js
13:28:36 INFO - PROCESS | 3632 | ++DOMWINDOW == 22 (0000007524E6F000) [pid = 3632] [serial = 49] [outer = 00000075249C6000]
13:29:19 INFO - PROCESS | 3632 | ++DOMWINDOW == 23 (0000007522D79000) [pid = 3632] [serial = 50] [outer = 00000075237F2800]
13:29:27 INFO - PROCESS | 3632 | --DOCSHELL 000000753BE54800 == 9 [pid = 3632] [id = 15]
13:29:29 INFO - PROCESS | 3632 | --DOMWINDOW == 22 (000000753BE55000) [pid = 3632] [serial = 42] [outer = 0000000000000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_bits.html]
13:29:34 INFO - PROCESS | 3632 | --DOMWINDOW == 21 (000000753BE5D800) [pid = 3632] [serial = 44] [outer = 0000000000000000] [url = about:blank]
13:29:34 INFO - PROCESS | 3632 | --DOMWINDOW == 20 (0000007522D86000) [pid = 3632] [serial = 46] [outer = 0000000000000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
13:29:34 INFO - PROCESS | 3632 | --DOMWINDOW == 19 (0000007524E6A000) [pid = 3632] [serial = 48] [outer = 0000000000000000] [url = about:blank]
13:31:36 INFO - PROCESS | 3632 | MARIONETTE LOG: INFO: Timeout fired
13:31:36 INFO - PROCESS | 3632 | 1483651896251 Marionette TRACE conn6 <- [1,37,null,{"value":["/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html",2,null,null,[]]}]
13:31:36 INFO - TEST-TIMEOUT | /WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html | took 180565ms
13:31:36 INFO - PROCESS | 3632 | 1483651896291 Marionette TRACE conn6 -> [0,38,"getWindowHandle",null]
13:31:36 INFO - PROCESS | 3632 | 1483651896296 Marionette TRACE conn6 <- [1,38,null,{"value":"13"}]
13:31:36 INFO - TEST-START | /WebCryptoAPI/derive_bits_keys/test_hkdf.html
13:31:36 INFO - PROCESS | 3632 | 1483651896336 Marionette TRACE conn6 -> [0,39,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:31:36 INFO - PROCESS | 3632 | 1483651896481 Marionette TRACE conn6 <- [1,39,null,{"value":null}]
13:31:36 INFO - PROCESS | 3632 | 1483651896513 Marionette TRACE conn6 -> [0,40,"getWindowHandles",null]
13:31:36 INFO - PROCESS | 3632 | 1483651896518 Marionette TRACE conn6 <- [1,40,null,["13"]]
13:31:36 INFO - PROCESS | 3632 | 1483651896523 Marionette TRACE conn6 -> [0,41,"switchToWindow",{"name":"13"}]
13:31:36 INFO - PROCESS | 3632 | 1483651896529 Marionette TRACE conn6 <- [1,41,null,{}]
13:31:36 INFO - PROCESS | 3632 | 1483651896534 Marionette TRACE conn6 -> [0,42,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/WebCryptoAPI/derive_bits_keys/test_hkdf.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html\", \"82719711-f12c-4532-af7b-31974de52539\");\n\nvar timer = null;\nif (180000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 180000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:31:36 INFO - PROCESS | 3632 | ++DOCSHELL 0000007523F56000 == 10 [pid = 3632] [id = 17]
13:31:36 INFO - PROCESS | 3632 | ++DOMWINDOW == 20 (0000007523F57800) [pid = 3632] [serial = 51] [outer = 0000000000000000]
13:31:36 INFO - PROCESS | 3632 | ++DOMWINDOW == 21 (00000075240CB800) [pid = 3632] [serial = 52] [outer = 0000007523F57800]
13:31:36 INFO - PROCESS | 3632 | 1483651896625 Marionette DEBUG loaded listener.js
13:31:36 INFO - PROCESS | 3632 | ++DOMWINDOW == 22 (0000007525B23000) [pid = 3632] [serial = 53] [outer = 0000007523F57800]
13:31:46 INFO - PROCESS | 3632 | 1483651905786 Marionette TRACE conn6 <- [1,42,null,{"value":["/WebCryptoAPI/derive_bits_keys/test_hkdf.html",0,null,null,[["short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["short derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["short derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["short derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["short derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["short derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["short derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using short derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with normal info",0,null,null],["long derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, normal salt, PBKDF2, with empty info",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"OperationError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info with missing salt",1,"assert_equals: deriveBits missing salt correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:128:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:124:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:123:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing info",1,"assert_equals: deriveBits missing info correctly threw OperationError: An invalid or illegal string was specified expected \"TypeError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:138:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:134:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:133:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with null length",1,"assert_equals: deriveBits with null length correctly threw OperationError: Data provided to an operation does not meet requirements expected \"TypeError\" but got \"DataError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:148:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:144:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:143:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_unreached: non-multiple of 8 length should have thrown an OperationError Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:156:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: An invalid or illegal string was specified expected \"NotSupportedError\" but got \"SyntaxError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["long derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",0,null,null],["long derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["long derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with normal info",0,null,null],["long derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",0,null,null],["Derived key of type name: AES-CBC length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CBC length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-CTR length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-GCM length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 128 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 192 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: AES-KW length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using long derivedKey, empty salt, PBKDF2, with empty info",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with null length",0,null,null],["empty derivedKey, normal salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with missing salt",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with missing info",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with null length",0,null,null],["empty derivedKey, normal salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, normal salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, normal salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, normal salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-384, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-384, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with bad hash name SHA384",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-384, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-512, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-512, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with bad hash name SHA512",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-512, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-1, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-1, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with bad hash name SHA1",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-1, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with null length",0,null,null],["empty derivedKey, empty salt, SHA-256, with normal info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with normal info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveBits failed with error TypeError: Argument 2 of SubtleCrypto.deriveBits is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:44:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:40:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:39:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with 0 length",1,"assert_equals: deriveBits with 0 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:54:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:50:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:49:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info",1,"assert_unreached: deriveKey failed with error TypeError: Argument 2 of SubtleCrypto.deriveKey is not an object. Reached unreachable code","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:79:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:69:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:68:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveKey with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:94:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:90:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:88:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with missing deriveKey usage",1,"assert_equals: deriveKey with missing deriveKey usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:104:37\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:100:40\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:99:29\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:60:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with missing salt",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with missing info",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with null length",0,null,null],["empty derivedKey, empty salt, SHA-256, with empty info with non-multiple of 8 length",1,"assert_equals: deriveBits with non-multiple of 8 length correctly threw OperationError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"OperationError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:158:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:154:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:153:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with bad hash name SHA256",1,"assert_equals: deriveBits with bad hash name correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:170:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:166:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:164:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with missing deriveBits usage",1,"assert_equals: deriveBits with missing deriveBits usage correctly threw InvalidAccessError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"InvalidAccessError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:180:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:176:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:175:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:34:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:33:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, SHA-256, with empty info with wrong (ECDH) key",0,null,null],["empty derivedKey, empty salt, PBKDF2, with normal info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with normal info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["empty derivedKey, empty salt, PBKDF2, with empty info with non-digest algorithm PBKDF2",1,"assert_equals: deriveBits with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveBits is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:210:29\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:206:32\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:205:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CBC length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-CTR length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-GCM length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 128 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 192 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: AES-KW length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-1 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-256 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-384 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"],["Derived key of type name: HMAC hash: SHA-512 length: 256 using empty derivedKey, empty salt, PBKDF2, with empty info",1,"assert_equals: derivekey with non-digest algorithm correctly threw NotSupportedError: Argument 2 of SubtleCrypto.deriveKey is not an object. expected \"NotSupportedError\" but got \"TypeError\"","run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:226:33\npromise callback*run_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:222:36\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\npromise callback*promise_test@http://web-platform.test:8000/resources/testharness.js:529:31\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:221:25\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:214:21\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:198:17\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:32:13\nrun_test/<@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:31:9\npromise callback*run_test@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/hkdf.js:17:5\n@http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html:18:1\n"]]]}]
13:31:48 INFO - ............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
13:31:48 INFO - TEST-OK | /WebCryptoAPI/derive_bits_keys/test_hkdf.html | took 11940ms
13:31:48 INFO - PROCESS | 3632 | 1483651908288 Marionette TRACE conn6 -> [0,43,"getWindowHandle",null]
13:31:48 INFO - PROCESS | 3632 | 1483651908292 Marionette TRACE conn6 <- [1,43,null,{"value":"13"}]
13:31:48 INFO - PROCESS | 3632 | 1483651908300 Marionette TRACE conn6 -> [0,44,"setTimeouts",{"script":35000}]
13:31:48 INFO - TEST-START | /XMLHttpRequest/FormData-append.html
13:31:48 INFO - PROCESS | 3632 | 1483651908307 Marionette TRACE conn6 <- [1,44,null,{}]
13:31:48 INFO - PROCESS | 3632 | 1483651908315 Marionette TRACE conn6 -> [0,45,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:31:48 INFO - PROCESS | 3632 | 1483651908494 Marionette TRACE conn6 <- [1,45,null,{"value":null}]
13:31:48 INFO - PROCESS | 3632 | 1483651908546 Marionette TRACE conn6 -> [0,46,"getWindowHandles",null]
13:31:48 INFO - PROCESS | 3632 | 1483651908551 Marionette TRACE conn6 <- [1,46,null,["13"]]
13:31:48 INFO - PROCESS | 3632 | 1483651908556 Marionette TRACE conn6 -> [0,47,"switchToWindow",{"name":"13"}]
13:31:48 INFO - PROCESS | 3632 | 1483651908562 Marionette TRACE conn6 <- [1,47,null,{}]
13:31:48 INFO - PROCESS | 3632 | 1483651908600 Marionette TRACE conn6 -> [0,48,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/FormData-append.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/FormData-append.html\", \"82719711-f12c-4532-af7b-31974de52539\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:31:48 INFO - PROCESS | 3632 | ++DOCSHELL 0000007522D96800 == 11 [pid = 3632] [id = 18]
13:31:48 INFO - PROCESS | 3632 | ++DOMWINDOW == 23 (0000007522D97000) [pid = 3632] [serial = 54] [outer = 0000000000000000]
13:31:48 INFO - PROCESS | 3632 | ++DOMWINDOW == 24 (0000007522D9D000) [pid = 3632] [serial = 55] [outer = 0000007522D97000]
13:31:48 INFO - PROCESS | 3632 | 1483651908671 Marionette DEBUG loaded listener.js
13:31:48 INFO - PROCESS | 3632 | ++DOMWINDOW == 25 (0000007522DA7000) [pid = 3632] [serial = 56] [outer = 0000007522D97000]
13:31:48 INFO - PROCESS | 3632 | --DOCSHELL 00000075242D9000 == 10 [pid = 3632] [id = 16]
13:31:49 INFO - PROCESS | 3632 | 1483651909088 Marionette TRACE conn6 <- [1,48,null,{"value":["/XMLHttpRequest/FormData-append.html",0,null,null,[["Passing a String object to FormData.append should work.",0,null,null],["testFormDataAppend1",0,null,null],["testFormDataAppend2",0,null,null],["testFormDataAppendUndefined1",0,null,null],["testFormDataAppendUndefined2",0,null,null],["testFormDataAppendNull1",0,null,null],["testFormDataAppendNull2",0,null,null],["testFormDataAppendToForm1",0,null,null],["testFormDataAppendToForm2",0,null,null],["testFormDataAppendToFormUndefined1",0,null,null],["testFormDataAppendToFormUndefined2",0,null,null],["testFormDataAppendToFormNull1",0,null,null],["testFormDataAppendToFormNull2",0,null,null],["testFormDataAppendEmptyBlob",0,null,null]]]}]
13:31:49 INFO - ..............
13:31:49 INFO - TEST-OK | /XMLHttpRequest/FormData-append.html | took 840ms
13:31:49 INFO - PROCESS | 3632 | 1483651909147 Marionette TRACE conn6 -> [0,49,"getWindowHandle",null]
13:31:49 INFO - PROCESS | 3632 | 1483651909151 Marionette TRACE conn6 <- [1,49,null,{"value":"13"}]
13:31:49 INFO - TEST-START | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.html
13:31:49 INFO - PROCESS | 3632 | 1483651909156 Marionette TRACE conn6 -> [0,50,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:31:49 INFO - PROCESS | 3632 | 1483651909276 Marionette TRACE conn6 <- [1,50,null,{"value":null}]
13:31:49 INFO - PROCESS | 3632 | 1483651909328 Marionette TRACE conn6 -> [0,51,"getWindowHandles",null]
13:31:49 INFO - PROCESS | 3632 | 1483651909332 Marionette TRACE conn6 <- [1,51,null,["13"]]
13:31:49 INFO - PROCESS | 3632 | 1483651909336 Marionette TRACE conn6 -> [0,52,"switchToWindow",{"name":"13"}]
13:31:49 INFO - PROCESS | 3632 | 1483651909340 Marionette TRACE conn6 <- [1,52,null,{}]
13:31:49 INFO - PROCESS | 3632 | 1483651909352 Marionette TRACE conn6 -> [0,53,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html\", \"82719711-f12c-4532-af7b-31974de52539\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:31:49 INFO - PROCESS | 3632 | ++DOCSHELL 0000007522DA8000 == 11 [pid = 3632] [id = 19]
13:31:49 INFO - PROCESS | 3632 | ++DOMWINDOW == 26 (0000007524E51800) [pid = 3632] [serial = 57] [outer = 0000000000000000]
13:31:49 INFO - PROCESS | 3632 | ++DOMWINDOW == 27 (0000007524E5B800) [pid = 3632] [serial = 58] [outer = 0000007524E51800]
13:31:49 INFO - PROCESS | 3632 | 1483651909418 Marionette DEBUG loaded listener.js
13:31:49 INFO - PROCESS | 3632 | ++DOMWINDOW == 28 (000000752505F800) [pid = 3632] [serial = 59] [outer = 0000007524E51800]
13:31:49 INFO - PROCESS | 3632 | [3632] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
13:31:49 INFO - PROCESS | 3632 | --DOCSHELL 0000007535C89000 == 10 [pid = 3632] [id = 11]
13:31:50 INFO - PROCESS | 3632 | --DOMWINDOW == 27 (00000075249C6000) [pid = 3632] [serial = 47] [outer = 0000000000000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_ecdh_keys.html]
13:31:50 INFO - PROCESS | 3632 | 1483651910805 Marionette TRACE conn6 <- [1,53,null,{"value":["/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html",0,null,null,[["default value is false, set value is true",0,null,null],["can also be set in OPEN state",0,null,null],["setting on synchronous XHR",0,null,null],["setting withCredentials when not in UNSENT, OPENED state (asynchronous)",0,null,null],["setting withCredentials when in DONE state (synchronous)",0,null,null]]]}]
13:31:50 INFO - .....
13:31:50 INFO - TEST-OK | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.html | took 1676ms
13:31:50 INFO - PROCESS | 3632 | 1483651910832 Marionette TRACE conn6 -> [0,54,"getWindowHandle",null]
13:31:50 INFO - PROCESS | 3632 | 1483651910835 Marionette TRACE conn6 <- [1,54,null,{"value":"13"}]
13:31:50 INFO - TEST-START | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker
13:31:50 INFO - PROCESS | 3632 | 1483651910840 Marionette TRACE conn6 -> [0,55,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:31:50 INFO - PROCESS | 3632 | 1483651910956 Marionette TRACE conn6 <- [1,55,null,{"value":null}]
13:31:51 INFO - PROCESS | 3632 | 1483651911005 Marionette TRACE conn6 -> [0,56,"getWindowHandles",null]
13:31:51 INFO - PROCESS | 3632 | 1483651911009 Marionette TRACE conn6 <- [1,56,null,["13"]]
13:31:51 INFO - PROCESS | 3632 | 1483651911012 Marionette TRACE conn6 -> [0,57,"switchToWindow",{"name":"13"}]
13:31:51 INFO - PROCESS | 3632 | 1483651911018 Marionette TRACE conn6 <- [1,57,null,{}]
13:31:51 INFO - PROCESS | 3632 | 1483651911021 Marionette TRACE conn6 -> [0,58,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker\", \"82719711-f12c-4532-af7b-31974de52539\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:31:51 INFO - PROCESS | 3632 | ++DOCSHELL 000000752999A000 == 11 [pid = 3632] [id = 20]
13:31:51 INFO - PROCESS | 3632 | ++DOMWINDOW == 28 (000000752999A800) [pid = 3632] [serial = 60] [outer = 0000000000000000]
13:31:51 INFO - PROCESS | 3632 | ++DOMWINDOW == 29 (00000075299AA800) [pid = 3632] [serial = 61] [outer = 000000752999A800]
13:31:51 INFO - PROCESS | 3632 | 1483651911088 Marionette DEBUG loaded listener.js
13:31:51 INFO - PROCESS | 3632 | ++DOMWINDOW == 30 (0000007529CD6000) [pid = 3632] [serial = 62] [outer = 000000752999A800]
13:31:51 INFO - PROCESS | 3632 | [3632] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
13:31:56 INFO - PROCESS | 3632 | --DOCSHELL 0000007522DA8000 == 10 [pid = 3632] [id = 19]
13:31:56 INFO - PROCESS | 3632 | --DOCSHELL 0000007522D96800 == 9 [pid = 3632] [id = 18]
13:31:56 INFO - PROCESS | 3632 | --DOCSHELL 0000007523F56000 == 8 [pid = 3632] [id = 17]
13:31:56 INFO - PROCESS | 3632 | --DOCSHELL 0000007522FC5000 == 7 [pid = 3632] [id = 12]
13:31:56 INFO - PROCESS | 3632 | --DOMWINDOW == 29 (0000007524E6F000) [pid = 3632] [serial = 49] [outer = 0000000000000000] [url = about:blank]
13:31:56 INFO - PROCESS | 3632 | --DOMWINDOW == 28 (00000075240CB800) [pid = 3632] [serial = 52] [outer = 0000000000000000] [url = about:blank]
13:31:59 INFO - PROCESS | 3632 | --DOMWINDOW == 27 (0000007522D97000) [pid = 3632] [serial = 54] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/FormData-append.html]
13:31:59 INFO - PROCESS | 3632 | --DOMWINDOW == 26 (0000007523F57800) [pid = 3632] [serial = 51] [outer = 0000000000000000] [url = http://web-platform.test:8000/WebCryptoAPI/derive_bits_keys/test_hkdf.html]
13:31:59 INFO - PROCESS | 3632 | --DOMWINDOW == 25 (0000007524E51800) [pid = 3632] [serial = 57] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/XMLHttpRequest-withCredentials.any.html]
13:31:59 INFO - PROCESS | 3632 | --DOMWINDOW == 24 (00000075237F2800) [pid = 3632] [serial = 32] [outer = 0000000000000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
13:31:59 INFO - PROCESS | 3632 | --DOMWINDOW == 23 (0000007535C89800) [pid = 3632] [serial = 29] [outer = 0000000000000000] [url = data:application/vnd.mozilla.xul+xml;charset=utf-8,]
13:32:04 INFO - PROCESS | 3632 | --DOMWINDOW == 22 (0000007525B23000) [pid = 3632] [serial = 53] [outer = 0000000000000000] [url = about:blank]
13:32:04 INFO - PROCESS | 3632 | --DOMWINDOW == 21 (0000007522D79000) [pid = 3632] [serial = 50] [outer = 0000000000000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
13:32:04 INFO - PROCESS | 3632 | --DOMWINDOW == 20 (0000007522DA7000) [pid = 3632] [serial = 56] [outer = 0000000000000000] [url = about:blank]
13:32:04 INFO - PROCESS | 3632 | --DOMWINDOW == 19 (0000007522D9D000) [pid = 3632] [serial = 55] [outer = 0000000000000000] [url = about:blank]
13:32:04 INFO - PROCESS | 3632 | --DOMWINDOW == 18 (000000752505F800) [pid = 3632] [serial = 59] [outer = 0000000000000000] [url = about:blank]
13:32:04 INFO - PROCESS | 3632 | --DOMWINDOW == 17 (0000007524E5B800) [pid = 3632] [serial = 58] [outer = 0000000000000000] [url = about:blank]
13:32:04 INFO - PROCESS | 3632 | --DOMWINDOW == 16 (00000075322A5800) [pid = 3632] [serial = 31] [outer = 0000000000000000] [url = data:application/vnd.mozilla.xul+xml;charset=utf-8,]
13:32:04 INFO - PROCESS | 3632 | --DOMWINDOW == 15 (00000075299AA800) [pid = 3632] [serial = 61] [outer = 0000000000000000] [url = about:blank]
13:32:21 INFO - PROCESS | 3632 | MARIONETTE LOG: INFO: Timeout fired
13:32:21 INFO - PROCESS | 3632 | JavaScript error: executormarionette.py, line 33: TypeError: window.wrappedJSObject.win.timeout is not a function
13:32:26 INFO - PROCESS | 3632 | 1483651946047 Marionette TRACE conn6 <- [1,58,{"error":"script timeout","message":"Timed out","stacktrace":""},null]
13:32:26 INFO - TEST-TIMEOUT | /XMLHttpRequest/XMLHttpRequest-withCredentials.any.worker | took 35243ms
13:32:26 WARNING - u'runner_teardown' ()
13:32:26 INFO - Setting up ssl
13:32:27 INFO - PROCESS | certutil |
13:32:27 INFO - PROCESS | certutil |
13:32:27 INFO - PROCESS | certutil |
13:32:27 INFO - Certificate Nickname Trust Attributes
13:32:27 INFO - SSL,S/MIME,JAR/XPI
13:32:27 INFO -
13:32:27 INFO - web-platform-tests CT,,
13:32:27 INFO -
13:32:27 INFO - Application command: C:\slave\test\build\application\firefox\firefox.exe -marionette about:blank -profile c:\users\cltbld~1.t-w\appdata\local\temp\tmpewwzy5.mozrunner
13:32:27 INFO - Starting runner
13:32:27 INFO - PROCESS | 1608 | [1608] WARNING: Failed to load startupcache file correctly, removing!: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/startupcache/StartupCache.cpp, line 219
13:32:27 INFO - PROCESS | 1608 | [1608] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x80004005: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/xpcom/base/nsSystemInfo.cpp, line 116
13:32:28 INFO - PROCESS | 1608 | [1608] WARNING: This method is lossy. Use GetCanonicalPath !: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/xpcom/io/nsLocalFileWin.cpp, line 3576
13:32:29 INFO - PROCESS | 1608 | 1483651949839 Marionette DEBUG Marionette enabled via build flag and pref
13:32:30 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3AF140000 == 1 [pid = 1608] [id = 1]
13:32:30 INFO - PROCESS | 1608 | ++DOMWINDOW == 1 (000000E3BD04B000) [pid = 1608] [serial = 1] [outer = 0000000000000000]
13:32:30 INFO - PROCESS | 1608 | ++DOMWINDOW == 2 (000000E3BD04C000) [pid = 1608] [serial = 2] [outer = 000000E3BD04B000]
13:32:31 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3BD044000 == 2 [pid = 1608] [id = 2]
13:32:31 INFO - PROCESS | 1608 | ++DOMWINDOW == 3 (000000E3C0484800) [pid = 1608] [serial = 3] [outer = 0000000000000000]
13:32:31 INFO - PROCESS | 1608 | ++DOMWINDOW == 4 (000000E3C0485800) [pid = 1608] [serial = 4] [outer = 000000E3C0484800]
13:32:31 INFO - PROCESS | 1608 | 1483651951584 Marionette INFO Listening on port 2829
13:32:33 INFO - PROCESS | 1608 | 1483651953385 Marionette DEBUG Marionette enabled via command-line flag
13:32:33 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C1520800 == 3 [pid = 1608] [id = 3]
13:32:33 INFO - PROCESS | 1608 | ++DOMWINDOW == 5 (000000E3C1705000) [pid = 1608] [serial = 5] [outer = 0000000000000000]
13:32:33 INFO - PROCESS | 1608 | ++DOMWINDOW == 6 (000000E3C1706000) [pid = 1608] [serial = 6] [outer = 000000E3C1705000]
13:32:33 INFO - PROCESS | 1608 | ++DOMWINDOW == 7 (000000E3C214F000) [pid = 1608] [serial = 7] [outer = 000000E3C0484800]
13:32:33 INFO - PROCESS | 1608 | 1483651953633 Marionette DEBUG Accepted connection conn0 from 127.0.0.1:49359
13:32:33 INFO - PROCESS | 1608 | 1483651953653 Marionette DEBUG Accepted connection conn1 from 127.0.0.1:49360
13:32:33 INFO - PROCESS | 1608 | 1483651953661 Marionette DEBUG Accepted connection conn2 from 127.0.0.1:49361
13:32:33 INFO - PROCESS | 1608 | 1483651953669 Marionette DEBUG Accepted connection conn3 from 127.0.0.1:49362
13:32:33 INFO - PROCESS | 1608 | 1483651953699 Marionette DEBUG Closed connection conn0
13:32:33 INFO - PROCESS | 1608 | 1483651953701 Marionette DEBUG Closed connection conn1
13:32:33 INFO - PROCESS | 1608 | 1483651953703 Marionette DEBUG Closed connection conn2
13:32:33 INFO - PROCESS | 1608 | 1483651953766 Marionette DEBUG Closed connection conn3
13:32:33 INFO - PROCESS | 1608 | 1483651953772 Marionette DEBUG Accepted connection conn4 from 127.0.0.1:49363
13:32:33 INFO - PROCESS | 1608 | 1483651953801 Marionette DEBUG Closed connection conn4
13:32:33 INFO - PROCESS | 1608 | 1483651953806 Marionette DEBUG Accepted connection conn5 from 127.0.0.1:49364
13:32:33 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3BD04A800 == 4 [pid = 1608] [id = 4]
13:32:33 INFO - PROCESS | 1608 | ++DOMWINDOW == 8 (000000E3C2927800) [pid = 1608] [serial = 8] [outer = 0000000000000000]
13:32:33 INFO - PROCESS | 1608 | ++DOMWINDOW == 9 (000000E3C4F5D800) [pid = 1608] [serial = 9] [outer = 000000E3C2927800]
13:32:33 INFO - PROCESS | 1608 | ++DOMWINDOW == 10 (000000E3C4F68000) [pid = 1608] [serial = 10] [outer = 000000E3C2927800]
13:32:33 INFO - PROCESS | 1608 | 1483651953983 Marionette TRACE conn5 -> [0,1,"newSession",{"sessionId":null,"capabilities":null}]
13:32:33 INFO - PROCESS | 1608 | 1483651953989 Marionette CONFIG Changing capabilities: {"browserName":"firefox","browserVersion":"52.0a2","platformName":"windows_nt","platformVersion":"6.2","acceptInsecureCerts":false,"rotatable":false,"proxy":{},"specificationLevel":0,"moz:processID":1608,"moz:profile":"c:\\users\\cltbld~1.t-w\\appdata\\local\\temp\\tmpewwzy5.mozrunner","moz:accessibilityChecks":false}
13:32:34 INFO - PROCESS | 1608 | [1608] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
13:32:34 INFO - PROCESS | 1608 | [1608] WARNING: getting z level of unregistered window: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/xpfe/appshell/nsWindowMediator.cpp, line 623
13:32:34 INFO - PROCESS | 1608 | [1608] WARNING: NS_ENSURE_TRUE(layerManager) failed: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/media/MediaDecoder.cpp, line 301
13:32:34 INFO - PROCESS | 1608 | [1608] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1566
13:32:34 INFO - PROCESS | 1608 | [1608] WARNING: attempt to modify an immutable nsStandardURL: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/netwerk/base/nsStandardURL.cpp, line 1566
13:32:34 INFO - PROCESS | 1608 | [1608] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
13:32:35 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C774A800 == 5 [pid = 1608] [id = 5]
13:32:35 INFO - PROCESS | 1608 | ++DOMWINDOW == 11 (000000E3C77B4800) [pid = 1608] [serial = 11] [outer = 0000000000000000]
13:32:35 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C77BD000 == 6 [pid = 1608] [id = 6]
13:32:35 INFO - PROCESS | 1608 | ++DOMWINDOW == 12 (000000E3C77C1000) [pid = 1608] [serial = 12] [outer = 0000000000000000]
13:32:36 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C8FD6800 == 7 [pid = 1608] [id = 7]
13:32:36 INFO - PROCESS | 1608 | ++DOMWINDOW == 13 (000000E3C8FD7000) [pid = 1608] [serial = 13] [outer = 0000000000000000]
13:32:36 INFO - PROCESS | 1608 | ++DOMWINDOW == 14 (000000E3C9275800) [pid = 1608] [serial = 14] [outer = 000000E3C8FD7000]
13:32:36 INFO - PROCESS | 1608 | ++DOMWINDOW == 15 (000000E3C94CE800) [pid = 1608] [serial = 15] [outer = 000000E3C77B4800]
13:32:36 INFO - PROCESS | 1608 | ++DOMWINDOW == 16 (000000E3C94D1000) [pid = 1608] [serial = 16] [outer = 000000E3C77C1000]
13:32:36 INFO - PROCESS | 1608 | ++DOMWINDOW == 17 (000000E3C95C5000) [pid = 1608] [serial = 17] [outer = 000000E3C8FD7000]
13:32:37 INFO - PROCESS | 1608 | 1483651957119 Marionette DEBUG loaded listener.js
13:32:38 INFO - PROCESS | 1608 | ++DOMWINDOW == 18 (000000E3CBA8F800) [pid = 1608] [serial = 18] [outer = 000000E3C8FD7000]
13:32:38 INFO - PROCESS | 1608 | 1483651958198 Marionette TRACE conn5 <- [1,1,null,{"sessionId":"5f61cb13-0e9f-4e3c-ac40-9eec6ed399d3","capabilities":{"browserName":"firefox","browserVersion":"52.0a2","platformName":"windows_nt","platformVersion":"6.2","acceptInsecureCerts":false,"rotatable":false,"proxy":{},"specificationLevel":0,"moz:processID":1608,"moz:profile":"c:\\users\\cltbld~1.t-w\\appdata\\local\\temp\\tmpewwzy5.mozrunner","moz:accessibilityChecks":false}}]
13:32:38 INFO - PROCESS | 1608 | 1483651958306 Marionette TRACE conn5 -> [0,2,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":139}]
13:32:38 INFO - PROCESS | 1608 | 1483651958389 Marionette TRACE conn5 <- [1,2,null,{"value":null}]
13:32:38 INFO - PROCESS | 1608 | 1483651958452 Marionette TRACE conn5 -> [0,3,"getWindowHandle",null]
13:32:38 INFO - PROCESS | 1608 | 1483651958456 Marionette TRACE conn5 <- [1,3,null,{"value":"13"}]
13:32:38 INFO - PROCESS | 1608 | 1483651958561 Marionette TRACE conn5 -> [0,4,"get",{"url":"http://web-platform.test:8000/testharness_runner.html"}]
13:32:38 INFO - PROCESS | 1608 | [1608] WARNING: Could not get disk status from nsIDiskSpaceWatcher: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/uriloader/prefetch/nsOfflineCacheUpdateService.cpp, line 283
13:32:39 INFO - PROCESS | 1608 | ++DOMWINDOW == 19 (000000E3CD5B1000) [pid = 1608] [serial = 19] [outer = 000000E3C8FD7000]
13:32:39 INFO - PROCESS | 1608 | 1483651959491 Marionette TRACE conn5 <- [1,4,null,{}]
13:32:39 INFO - PROCESS | 1608 | 1483651959496 Marionette TRACE conn5 -> [0,5,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"document.title = 'MainThread'","sandbox":"default","line":152}]
13:32:39 INFO - PROCESS | 1608 | 1483651959525 Marionette TRACE conn5 <- [1,5,null,{"value":null}]
13:32:39 INFO - PROCESS | 1608 | 1483651959554 Marionette TRACE conn5 -> [0,6,"getWindowHandle",null]
13:32:39 INFO - PROCESS | 1608 | 1483651959559 Marionette TRACE conn5 <- [1,6,null,{"value":"13"}]
13:32:39 INFO - TEST-START | /XMLHttpRequest/abort-after-receive.htm
13:32:39 INFO - PROCESS | 1608 | 1483651959575 Marionette TRACE conn5 -> [0,7,"setTimeouts",{"script":35000}]
13:32:39 INFO - PROCESS | 1608 | 1483651959579 Marionette TRACE conn5 <- [1,7,null,{}]
13:32:39 INFO - PROCESS | 1608 | 1483651959595 Marionette TRACE conn5 -> [0,8,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:32:39 INFO - PROCESS | 1608 | 1483651959623 Marionette TRACE conn5 <- [1,8,null,{"value":null}]
13:32:39 INFO - PROCESS | 1608 | 1483651959641 Marionette TRACE conn5 -> [0,9,"getWindowHandles",null]
13:32:39 INFO - PROCESS | 1608 | 1483651959643 Marionette TRACE conn5 <- [1,9,null,["13"]]
13:32:39 INFO - PROCESS | 1608 | 1483651959651 Marionette TRACE conn5 -> [0,10,"switchToWindow",{"name":"13"}]
13:32:39 INFO - PROCESS | 1608 | 1483651959655 Marionette TRACE conn5 <- [1,10,null,{}]
13:32:39 INFO - PROCESS | 1608 | 1483651959666 Marionette TRACE conn5 -> [0,11,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-receive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-receive.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:32:39 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CE304000 == 8 [pid = 1608] [id = 8]
13:32:39 INFO - PROCESS | 1608 | ++DOMWINDOW == 20 (000000E3CE304800) [pid = 1608] [serial = 20] [outer = 0000000000000000]
13:32:39 INFO - PROCESS | 1608 | ++DOMWINDOW == 21 (000000E3CE308000) [pid = 1608] [serial = 21] [outer = 000000E3CE304800]
13:32:39 INFO - PROCESS | 1608 | 1483651959733 Marionette DEBUG loaded listener.js
13:32:39 INFO - PROCESS | 1608 | ++DOMWINDOW == 22 (000000E3CE308800) [pid = 1608] [serial = 22] [outer = 000000E3CE304800]
13:32:40 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CEBA4800 == 9 [pid = 1608] [id = 9]
13:32:40 INFO - PROCESS | 1608 | ++DOMWINDOW == 23 (000000E3CEBA5000) [pid = 1608] [serial = 23] [outer = 0000000000000000]
13:32:40 INFO - PROCESS | 1608 | ++DOMWINDOW == 24 (000000E3CE735000) [pid = 1608] [serial = 24] [outer = 000000E3CEBA5000]
13:32:40 INFO - PROCESS | 1608 | 1483651960094 Marionette DEBUG loaded listener.js
13:32:40 INFO - PROCESS | 1608 | ++DOMWINDOW == 25 (000000E3CE73D000) [pid = 1608] [serial = 25] [outer = 000000E3CEBA5000]
13:32:40 INFO - PROCESS | 1608 | 1483651960556 Marionette TRACE conn5 <- [1,11,null,{"value":["/XMLHttpRequest/abort-after-receive.htm",0,null,null,[["XMLHttpRequest: abort() after successful receive should not fire \"abort\" event",0,null,null]]]}]
13:32:40 INFO - .
13:32:40 INFO - TEST-OK | /XMLHttpRequest/abort-after-receive.htm | took 1040ms
13:32:40 INFO - TEST-START | /XMLHttpRequest/abort-after-send.htm
13:32:40 INFO - PROCESS | 1608 | 1483651960608 Marionette TRACE conn5 -> [0,12,"getWindowHandle",null]
13:32:40 INFO - PROCESS | 1608 | 1483651960611 Marionette TRACE conn5 <- [1,12,null,{"value":"13"}]
13:32:40 INFO - PROCESS | 1608 | 1483651960615 Marionette TRACE conn5 -> [0,13,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:32:40 INFO - PROCESS | 1608 | 1483651960780 Marionette TRACE conn5 <- [1,13,null,{"value":null}]
13:32:40 INFO - PROCESS | 1608 | --DOCSHELL 000000E3AF140000 == 8 [pid = 1608] [id = 1]
13:32:40 INFO - PROCESS | 1608 | 1483651960976 Marionette TRACE conn5 -> [0,14,"getWindowHandles",null]
13:32:40 INFO - PROCESS | 1608 | 1483651960982 Marionette TRACE conn5 <- [1,14,null,["13"]]
13:32:40 INFO - PROCESS | 1608 | 1483651960990 Marionette TRACE conn5 -> [0,15,"switchToWindow",{"name":"13"}]
13:32:41 INFO - PROCESS | 1608 | 1483651960998 Marionette TRACE conn5 <- [1,15,null,{}]
13:32:41 INFO - PROCESS | 1608 | 1483651961005 Marionette TRACE conn5 -> [0,16,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-send.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:32:41 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3BAD79000 == 9 [pid = 1608] [id = 10]
13:32:41 INFO - PROCESS | 1608 | ++DOMWINDOW == 26 (000000E3BADAE800) [pid = 1608] [serial = 26] [outer = 0000000000000000]
13:32:41 INFO - PROCESS | 1608 | ++DOMWINDOW == 27 (000000E3BB03B000) [pid = 1608] [serial = 27] [outer = 000000E3BADAE800]
13:32:41 INFO - PROCESS | 1608 | 1483651961082 Marionette DEBUG loaded listener.js
13:32:41 INFO - PROCESS | 1608 | ++DOMWINDOW == 28 (000000E3BB9A3800) [pid = 1608] [serial = 28] [outer = 000000E3BADAE800]
13:32:41 INFO - PROCESS | 1608 | 1483651961590 Marionette TRACE conn5 <- [1,16,null,{"value":["/XMLHttpRequest/abort-after-send.htm",0,null,null,[["XMLHttpRequest: abort() after send()",0,null,null]]]}]
13:32:41 INFO - .
13:32:41 INFO - TEST-OK | /XMLHttpRequest/abort-after-send.htm | took 1024ms
13:32:41 INFO - PROCESS | 1608 | 1483651961642 Marionette TRACE conn5 -> [0,17,"getWindowHandle",null]
13:32:41 INFO - TEST-START | /XMLHttpRequest/abort-after-stop.htm
13:32:41 INFO - PROCESS | 1608 | 1483651961650 Marionette TRACE conn5 <- [1,17,null,{"value":"13"}]
13:32:41 INFO - PROCESS | 1608 | 1483651961656 Marionette TRACE conn5 -> [0,18,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:32:41 INFO - PROCESS | 1608 | 1483651961862 Marionette TRACE conn5 <- [1,18,null,{"value":null}]
13:32:41 INFO - PROCESS | 1608 | 1483651961943 Marionette TRACE conn5 -> [0,19,"getWindowHandles",null]
13:32:41 INFO - PROCESS | 1608 | 1483651961947 Marionette TRACE conn5 <- [1,19,null,["13"]]
13:32:41 INFO - PROCESS | 1608 | 1483651961951 Marionette TRACE conn5 -> [0,20,"switchToWindow",{"name":"13"}]
13:32:41 INFO - PROCESS | 1608 | 1483651961956 Marionette TRACE conn5 <- [1,20,null,{}]
13:32:41 INFO - PROCESS | 1608 | 1483651961962 Marionette TRACE conn5 -> [0,21,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-stop.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:32:41 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3BD30E800 == 10 [pid = 1608] [id = 11]
13:32:41 INFO - PROCESS | 1608 | ++DOMWINDOW == 29 (000000E3BD319000) [pid = 1608] [serial = 29] [outer = 0000000000000000]
13:32:42 INFO - PROCESS | 1608 | ++DOMWINDOW == 30 (000000E3BD338000) [pid = 1608] [serial = 30] [outer = 000000E3BD319000]
13:32:42 INFO - PROCESS | 1608 | 1483651962035 Marionette DEBUG loaded listener.js
13:32:42 INFO - PROCESS | 1608 | ++DOMWINDOW == 31 (000000E3C09A5800) [pid = 1608] [serial = 31] [outer = 000000E3BD319000]
13:32:43 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C215F800 == 11 [pid = 1608] [id = 12]
13:32:43 INFO - PROCESS | 1608 | ++DOMWINDOW == 32 (000000E3C2160000) [pid = 1608] [serial = 32] [outer = 0000000000000000]
13:32:43 INFO - PROCESS | 1608 | ++DOMWINDOW == 33 (000000E3C2161800) [pid = 1608] [serial = 33] [outer = 000000E3C2160000]
13:32:43 INFO - PROCESS | 1608 | ++DOMWINDOW == 34 (000000E3BA7F4000) [pid = 1608] [serial = 34] [outer = 000000E3C2160000]
13:32:43 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3B9FB9000 == 12 [pid = 1608] [id = 13]
13:32:43 INFO - PROCESS | 1608 | ++DOMWINDOW == 35 (000000E3BAD9C000) [pid = 1608] [serial = 35] [outer = 0000000000000000]
13:32:43 INFO - PROCESS | 1608 | ++DOMWINDOW == 36 (000000E3BAF59000) [pid = 1608] [serial = 36] [outer = 000000E3BAD9C000]
13:32:43 INFO - PROCESS | 1608 | ++DOMWINDOW == 37 (000000E3BB2C8000) [pid = 1608] [serial = 37] [outer = 000000E3BAD9C000]
13:32:43 INFO - PROCESS | 1608 | --DOCSHELL 000000E3BD04A800 == 11 [pid = 1608] [id = 4]
13:32:51 INFO - PROCESS | 1608 | [1608] WARNING: NS_ENSURE_TRUE(layerManager) failed: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/media/MediaDecoder.cpp, line 301
13:32:51 INFO - PROCESS | 1608 | [1608] WARNING: NS_ENSURE_TRUE(layerManager) failed: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/media/MediaDecoder.cpp, line 301
13:32:51 INFO - PROCESS | 1608 | --DOMWINDOW == 36 (000000E3CE304800) [pid = 1608] [serial = 20] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-receive.htm]
13:32:51 INFO - PROCESS | 1608 | --DOMWINDOW == 35 (000000E3C2927800) [pid = 1608] [serial = 8] [outer = 0000000000000000] [url = chrome://gfxsanity/content/sanitytest.html]
13:32:51 INFO - PROCESS | 1608 | --DOMWINDOW == 34 (000000E3BD04B000) [pid = 1608] [serial = 1] [outer = 0000000000000000] [url = chrome://gfxsanity/content/sanityparent.html]
13:32:51 INFO - PROCESS | 1608 | --DOMWINDOW == 33 (000000E3BADAE800) [pid = 1608] [serial = 26] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-send.htm]
13:32:55 INFO - PROCESS | 1608 | --DOCSHELL 000000E3CE304000 == 10 [pid = 1608] [id = 8]
13:32:55 INFO - PROCESS | 1608 | --DOCSHELL 000000E3BAD79000 == 9 [pid = 1608] [id = 10]
13:32:55 INFO - PROCESS | 1608 | --DOMWINDOW == 32 (000000E3CE735000) [pid = 1608] [serial = 24] [outer = 0000000000000000] [url = about:blank]
13:32:55 INFO - PROCESS | 1608 | --DOMWINDOW == 31 (000000E3C9275800) [pid = 1608] [serial = 14] [outer = 0000000000000000] [url = about:blank]
13:32:55 INFO - PROCESS | 1608 | --DOMWINDOW == 30 (000000E3C4F5D800) [pid = 1608] [serial = 9] [outer = 0000000000000000] [url = about:blank]
13:32:55 INFO - PROCESS | 1608 | --DOMWINDOW == 29 (000000E3C4F68000) [pid = 1608] [serial = 10] [outer = 0000000000000000] [url = chrome://gfxsanity/content/sanitytest.html]
13:32:55 INFO - PROCESS | 1608 | --DOMWINDOW == 28 (000000E3BD04C000) [pid = 1608] [serial = 2] [outer = 0000000000000000] [url = about:blank]
13:32:55 INFO - PROCESS | 1608 | --DOMWINDOW == 27 (000000E3C0485800) [pid = 1608] [serial = 4] [outer = 0000000000000000] [url = about:blank]
13:32:55 INFO - PROCESS | 1608 | --DOMWINDOW == 26 (000000E3BAF59000) [pid = 1608] [serial = 36] [outer = 0000000000000000] [url = about:blank]
13:32:55 INFO - PROCESS | 1608 | --DOMWINDOW == 25 (000000E3C95C5000) [pid = 1608] [serial = 17] [outer = 0000000000000000] [url = about:blank]
13:32:55 INFO - PROCESS | 1608 | --DOMWINDOW == 24 (000000E3C2161800) [pid = 1608] [serial = 33] [outer = 0000000000000000] [url = about:blank]
13:32:55 INFO - PROCESS | 1608 | --DOMWINDOW == 23 (000000E3CE308800) [pid = 1608] [serial = 22] [outer = 0000000000000000] [url = about:blank]
13:32:55 INFO - PROCESS | 1608 | --DOMWINDOW == 22 (000000E3CE308000) [pid = 1608] [serial = 21] [outer = 0000000000000000] [url = about:blank]
13:32:55 INFO - PROCESS | 1608 | --DOMWINDOW == 21 (000000E3BB9A3800) [pid = 1608] [serial = 28] [outer = 0000000000000000] [url = about:blank]
13:32:55 INFO - PROCESS | 1608 | --DOMWINDOW == 20 (000000E3BB03B000) [pid = 1608] [serial = 27] [outer = 0000000000000000] [url = about:blank]
13:32:55 INFO - PROCESS | 1608 | --DOMWINDOW == 19 (000000E3BD338000) [pid = 1608] [serial = 30] [outer = 0000000000000000] [url = about:blank]
13:33:12 INFO - PROCESS | 1608 | MARIONETTE LOG: INFO: Timeout fired
13:33:12 INFO - PROCESS | 1608 | 1483651992213 Marionette TRACE conn5 <- [1,21,null,{"value":["/XMLHttpRequest/abort-after-stop.htm",2,null,null,[["XMLHttpRequest: abort event should fire when stop() method is used",1,"assert_equals: expected true but got false","@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:24:13\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\n@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:23:11\nsetTimeout handler*@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:22:9\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\n@http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm:13:7\n"]]]}]
13:33:12 INFO - .
13:33:12 INFO - TEST-TIMEOUT | /XMLHttpRequest/abort-after-stop.htm | took 30621ms
13:33:12 INFO - PROCESS | 1608 | 1483651992278 Marionette TRACE conn5 -> [0,22,"getWindowHandle",null]
13:33:12 INFO - PROCESS | 1608 | 1483651992285 Marionette TRACE conn5 <- [1,22,null,{"value":"13"}]
13:33:12 INFO - TEST-START | /XMLHttpRequest/abort-after-timeout.htm
13:33:12 INFO - PROCESS | 1608 | 1483651992293 Marionette TRACE conn5 -> [0,23,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:12 INFO - PROCESS | 1608 | 1483651992409 Marionette TRACE conn5 <- [1,23,null,{"value":null}]
13:33:12 INFO - PROCESS | 1608 | 1483651992416 Marionette TRACE conn5 -> [0,24,"getWindowHandles",null]
13:33:12 INFO - PROCESS | 1608 | 1483651992421 Marionette TRACE conn5 <- [1,24,null,["13"]]
13:33:12 INFO - PROCESS | 1608 | 1483651992426 Marionette TRACE conn5 -> [0,25,"switchToWindow",{"name":"13"}]
13:33:12 INFO - PROCESS | 1608 | 1483651992432 Marionette TRACE conn5 <- [1,25,null,{}]
13:33:12 INFO - PROCESS | 1608 | 1483651992438 Marionette TRACE conn5 -> [0,26,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-after-timeout.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-after-timeout.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:12 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3BC40C000 == 10 [pid = 1608] [id = 14]
13:33:12 INFO - PROCESS | 1608 | ++DOMWINDOW == 20 (000000E3BC40F000) [pid = 1608] [serial = 38] [outer = 0000000000000000]
13:33:12 INFO - PROCESS | 1608 | ++DOMWINDOW == 21 (000000E3BC41F000) [pid = 1608] [serial = 39] [outer = 000000E3BC40F000]
13:33:12 INFO - PROCESS | 1608 | 1483651992501 Marionette DEBUG loaded listener.js
13:33:12 INFO - PROCESS | 1608 | ++DOMWINDOW == 22 (000000E3BC9DF000) [pid = 1608] [serial = 40] [outer = 000000E3BC40F000]
13:33:13 INFO - PROCESS | 1608 | 1483651993141 Marionette TRACE conn5 <- [1,26,null,{"value":["/XMLHttpRequest/abort-after-timeout.htm",0,null,null,[["XMLHttpRequest: abort() after a timeout should not fire \"abort\" event",0,null,null]]]}]
13:33:13 INFO - .
13:33:13 INFO - TEST-OK | /XMLHttpRequest/abort-after-timeout.htm | took 881ms
13:33:13 INFO - PROCESS | 1608 | 1483651993172 Marionette TRACE conn5 -> [0,27,"getWindowHandle",null]
13:33:13 INFO - PROCESS | 1608 | 1483651993176 Marionette TRACE conn5 <- [1,27,null,{"value":"13"}]
13:33:13 INFO - TEST-START | /XMLHttpRequest/abort-during-done.htm
13:33:13 INFO - PROCESS | 1608 | 1483651993181 Marionette TRACE conn5 -> [0,28,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:13 INFO - PROCESS | 1608 | 1483651993318 Marionette TRACE conn5 <- [1,28,null,{"value":null}]
13:33:13 INFO - PROCESS | 1608 | 1483651993327 Marionette TRACE conn5 -> [0,29,"getWindowHandles",null]
13:33:13 INFO - PROCESS | 1608 | 1483651993330 Marionette TRACE conn5 <- [1,29,null,["13"]]
13:33:13 INFO - PROCESS | 1608 | 1483651993334 Marionette TRACE conn5 -> [0,30,"switchToWindow",{"name":"13"}]
13:33:13 INFO - PROCESS | 1608 | 1483651993338 Marionette TRACE conn5 <- [1,30,null,{}]
13:33:13 INFO - PROCESS | 1608 | 1483651993345 Marionette TRACE conn5 -> [0,31,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-done.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-done.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:13 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3BC41B000 == 11 [pid = 1608] [id = 15]
13:33:13 INFO - PROCESS | 1608 | ++DOMWINDOW == 23 (000000E3C0485800) [pid = 1608] [serial = 41] [outer = 0000000000000000]
13:33:13 INFO - PROCESS | 1608 | ++DOMWINDOW == 24 (000000E3C048B000) [pid = 1608] [serial = 42] [outer = 000000E3C0485800]
13:33:13 INFO - PROCESS | 1608 | 1483651993406 Marionette DEBUG loaded listener.js
13:33:13 INFO - PROCESS | 1608 | ++DOMWINDOW == 25 (000000E3C0738800) [pid = 1608] [serial = 43] [outer = 000000E3C0485800]
13:33:13 INFO - PROCESS | 1608 | ++DOMWINDOW == 26 (000000E3C0728800) [pid = 1608] [serial = 44] [outer = 000000E3BAD9C000]
13:33:13 INFO - PROCESS | 1608 | 1483651993829 Marionette TRACE conn5 <- [1,31,null,{"value":["/XMLHttpRequest/abort-during-done.htm",0,null,null,[["XMLHttpRequest: abort() during DONE",0,null,null]]]}]
13:33:13 INFO - .
13:33:13 INFO - TEST-OK | /XMLHttpRequest/abort-during-done.htm | took 671ms
13:33:13 INFO - PROCESS | 1608 | 1483651993864 Marionette TRACE conn5 -> [0,32,"getWindowHandle",null]
13:33:13 INFO - PROCESS | 1608 | 1483651993870 Marionette TRACE conn5 <- [1,32,null,{"value":"13"}]
13:33:13 INFO - TEST-START | /XMLHttpRequest/abort-during-open.htm
13:33:13 INFO - PROCESS | 1608 | 1483651993874 Marionette TRACE conn5 -> [0,33,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:14 INFO - PROCESS | 1608 | 1483651994008 Marionette TRACE conn5 <- [1,33,null,{"value":null}]
13:33:14 INFO - PROCESS | 1608 | 1483651994043 Marionette TRACE conn5 -> [0,34,"getWindowHandles",null]
13:33:14 INFO - PROCESS | 1608 | 1483651994046 Marionette TRACE conn5 <- [1,34,null,["13"]]
13:33:14 INFO - PROCESS | 1608 | 1483651994049 Marionette TRACE conn5 -> [0,35,"switchToWindow",{"name":"13"}]
13:33:14 INFO - PROCESS | 1608 | 1483651994055 Marionette TRACE conn5 <- [1,35,null,{}]
13:33:14 INFO - PROCESS | 1608 | 1483651994059 Marionette TRACE conn5 -> [0,36,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-open.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:14 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C09A9000 == 12 [pid = 1608] [id = 16]
13:33:14 INFO - PROCESS | 1608 | ++DOMWINDOW == 27 (000000E3C09A9800) [pid = 1608] [serial = 45] [outer = 0000000000000000]
13:33:14 INFO - PROCESS | 1608 | ++DOMWINDOW == 28 (000000E3C09B4000) [pid = 1608] [serial = 46] [outer = 000000E3C09A9800]
13:33:14 INFO - PROCESS | 1608 | 1483651994122 Marionette DEBUG loaded listener.js
13:33:14 INFO - PROCESS | 1608 | ++DOMWINDOW == 29 (000000E3C0C46000) [pid = 1608] [serial = 47] [outer = 000000E3C09A9800]
13:33:14 INFO - PROCESS | 1608 | 1483651994486 Marionette TRACE conn5 <- [1,36,null,{"value":["/XMLHttpRequest/abort-during-open.htm",0,null,null,[["XMLHttpRequest: abort() during OPEN",0,null,null]]]}]
13:33:14 INFO - .
13:33:14 INFO - TEST-OK | /XMLHttpRequest/abort-during-open.htm | took 629ms
13:33:14 INFO - PROCESS | 1608 | 1483651994505 Marionette TRACE conn5 -> [0,37,"getWindowHandle",null]
13:33:14 INFO - PROCESS | 1608 | 1483651994509 Marionette TRACE conn5 <- [1,37,null,{"value":"13"}]
13:33:14 INFO - TEST-START | /XMLHttpRequest/abort-during-open.worker
13:33:14 INFO - PROCESS | 1608 | 1483651994514 Marionette TRACE conn5 -> [0,38,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:14 INFO - PROCESS | 1608 | 1483651994636 Marionette TRACE conn5 <- [1,38,null,{"value":null}]
13:33:14 INFO - PROCESS | 1608 | 1483651994642 Marionette TRACE conn5 -> [0,39,"getWindowHandles",null]
13:33:14 INFO - PROCESS | 1608 | 1483651994645 Marionette TRACE conn5 <- [1,39,null,["13"]]
13:33:14 INFO - PROCESS | 1608 | 1483651994648 Marionette TRACE conn5 -> [0,40,"switchToWindow",{"name":"13"}]
13:33:14 INFO - PROCESS | 1608 | 1483651994653 Marionette TRACE conn5 <- [1,40,null,{}]
13:33:14 INFO - PROCESS | 1608 | 1483651994658 Marionette TRACE conn5 -> [0,41,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-open.worker\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-open.worker\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:14 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C2376000 == 13 [pid = 1608] [id = 17]
13:33:14 INFO - PROCESS | 1608 | ++DOMWINDOW == 30 (000000E3C2376800) [pid = 1608] [serial = 48] [outer = 0000000000000000]
13:33:14 INFO - PROCESS | 1608 | ++DOMWINDOW == 31 (000000E3C26AE000) [pid = 1608] [serial = 49] [outer = 000000E3C2376800]
13:33:14 INFO - PROCESS | 1608 | 1483651994715 Marionette DEBUG loaded listener.js
13:33:14 INFO - PROCESS | 1608 | ++DOMWINDOW == 32 (000000E3C26B3800) [pid = 1608] [serial = 50] [outer = 000000E3C2376800]
13:33:14 INFO - PROCESS | 1608 | [1608] WARNING: Failed to retarget HTML data delivery to the parser thread.: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/parser/html/nsHtml5StreamParser.cpp, line 970
13:33:15 INFO - PROCESS | 1608 | 1483651995125 Marionette TRACE conn5 <- [1,41,null,{"value":["/XMLHttpRequest/abort-during-open.worker",0,null,null,[["Untitled",0,{},{}]]]}]
13:33:15 INFO - .
13:33:15 INFO - TEST-OK | /XMLHttpRequest/abort-during-open.worker | took 629ms
13:33:15 INFO - PROCESS | 1608 | 1483651995144 Marionette TRACE conn5 -> [0,42,"getWindowHandle",null]
13:33:15 INFO - PROCESS | 1608 | 1483651995146 Marionette TRACE conn5 <- [1,42,null,{"value":"13"}]
13:33:15 INFO - TEST-START | /XMLHttpRequest/abort-during-unsent.htm
13:33:15 INFO - PROCESS | 1608 | 1483651995151 Marionette TRACE conn5 -> [0,43,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:15 INFO - PROCESS | 1608 | 1483651995263 Marionette TRACE conn5 <- [1,43,null,{"value":null}]
13:33:15 INFO - PROCESS | 1608 | 1483651995271 Marionette TRACE conn5 -> [0,44,"getWindowHandles",null]
13:33:15 INFO - PROCESS | 1608 | 1483651995273 Marionette TRACE conn5 <- [1,44,null,["13"]]
13:33:15 INFO - PROCESS | 1608 | 1483651995276 Marionette TRACE conn5 -> [0,45,"switchToWindow",{"name":"13"}]
13:33:15 INFO - PROCESS | 1608 | 1483651995280 Marionette TRACE conn5 <- [1,45,null,{}]
13:33:15 INFO - PROCESS | 1608 | 1483651995283 Marionette TRACE conn5 -> [0,46,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-unsent.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-unsent.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:15 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C5FA0800 == 14 [pid = 1608] [id = 18]
13:33:15 INFO - PROCESS | 1608 | ++DOMWINDOW == 33 (000000E3C5FA2000) [pid = 1608] [serial = 51] [outer = 0000000000000000]
13:33:15 INFO - PROCESS | 1608 | ++DOMWINDOW == 34 (000000E3C5FA9800) [pid = 1608] [serial = 52] [outer = 000000E3C5FA2000]
13:33:15 INFO - PROCESS | 1608 | 1483651995339 Marionette DEBUG loaded listener.js
13:33:15 INFO - PROCESS | 1608 | ++DOMWINDOW == 35 (000000E3C5FB0000) [pid = 1608] [serial = 53] [outer = 000000E3C5FA2000]
13:33:15 INFO - PROCESS | 1608 | 1483651995674 Marionette TRACE conn5 <- [1,46,null,{"value":["/XMLHttpRequest/abort-during-unsent.htm",0,null,null,[["XMLHttpRequest: abort() during UNSENT",0,null,null]]]}]
13:33:15 INFO - .
13:33:15 INFO - TEST-OK | /XMLHttpRequest/abort-during-unsent.htm | took 587ms
13:33:15 INFO - PROCESS | 1608 | 1483651995740 Marionette TRACE conn5 -> [0,47,"getWindowHandle",null]
13:33:15 INFO - PROCESS | 1608 | 1483651995742 Marionette TRACE conn5 <- [1,47,null,{"value":"13"}]
13:33:15 INFO - TEST-START | /XMLHttpRequest/abort-during-upload.htm
13:33:15 INFO - PROCESS | 1608 | 1483651995747 Marionette TRACE conn5 -> [0,48,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:15 INFO - PROCESS | 1608 | 1483651995903 Marionette TRACE conn5 <- [1,48,null,{"value":null}]
13:33:15 INFO - PROCESS | 1608 | 1483651995911 Marionette TRACE conn5 -> [0,49,"getWindowHandles",null]
13:33:15 INFO - PROCESS | 1608 | 1483651995913 Marionette TRACE conn5 <- [1,49,null,["13"]]
13:33:15 INFO - PROCESS | 1608 | 1483651995916 Marionette TRACE conn5 -> [0,50,"switchToWindow",{"name":"13"}]
13:33:15 INFO - PROCESS | 1608 | 1483651995920 Marionette TRACE conn5 <- [1,50,null,{}]
13:33:15 INFO - PROCESS | 1608 | 1483651995924 Marionette TRACE conn5 -> [0,51,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-during-upload.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-during-upload.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:15 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C7170000 == 15 [pid = 1608] [id = 19]
13:33:15 INFO - PROCESS | 1608 | ++DOMWINDOW == 36 (000000E3C7170800) [pid = 1608] [serial = 54] [outer = 0000000000000000]
13:33:15 INFO - PROCESS | 1608 | ++DOMWINDOW == 37 (000000E3C7670000) [pid = 1608] [serial = 55] [outer = 000000E3C7170800]
13:33:15 INFO - PROCESS | 1608 | 1483651995980 Marionette DEBUG loaded listener.js
13:33:16 INFO - PROCESS | 1608 | ++DOMWINDOW == 38 (000000E3C768B800) [pid = 1608] [serial = 56] [outer = 000000E3C7170800]
13:33:16 INFO - PROCESS | 1608 | 1483651996338 Marionette TRACE conn5 <- [1,51,null,{"value":["/XMLHttpRequest/abort-during-upload.htm",0,null,null,[["XMLHttpRequest: abort() while sending data",0,null,null]]]}]
13:33:16 INFO - .
13:33:16 INFO - TEST-OK | /XMLHttpRequest/abort-during-upload.htm | took 627ms
13:33:16 INFO - PROCESS | 1608 | 1483651996375 Marionette TRACE conn5 -> [0,52,"getWindowHandle",null]
13:33:16 INFO - PROCESS | 1608 | 1483651996378 Marionette TRACE conn5 <- [1,52,null,{"value":"13"}]
13:33:16 INFO - TEST-START | /XMLHttpRequest/abort-event-abort.htm
13:33:16 INFO - PROCESS | 1608 | 1483651996382 Marionette TRACE conn5 -> [0,53,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:16 INFO - PROCESS | 1608 | 1483651996472 Marionette TRACE conn5 <- [1,53,null,{"value":null}]
13:33:16 INFO - PROCESS | 1608 | 1483651996524 Marionette TRACE conn5 -> [0,54,"getWindowHandles",null]
13:33:16 INFO - PROCESS | 1608 | 1483651996526 Marionette TRACE conn5 <- [1,54,null,["13"]]
13:33:16 INFO - PROCESS | 1608 | 1483651996530 Marionette TRACE conn5 -> [0,55,"switchToWindow",{"name":"13"}]
13:33:16 INFO - PROCESS | 1608 | 1483651996534 Marionette TRACE conn5 <- [1,55,null,{}]
13:33:16 INFO - PROCESS | 1608 | 1483651996537 Marionette TRACE conn5 -> [0,56,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-abort.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:16 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C7D11800 == 16 [pid = 1608] [id = 20]
13:33:16 INFO - PROCESS | 1608 | ++DOMWINDOW == 39 (000000E3C7D12000) [pid = 1608] [serial = 57] [outer = 0000000000000000]
13:33:16 INFO - PROCESS | 1608 | ++DOMWINDOW == 40 (000000E3C7D1D000) [pid = 1608] [serial = 58] [outer = 000000E3C7D12000]
13:33:16 INFO - PROCESS | 1608 | 1483651996593 Marionette DEBUG loaded listener.js
13:33:16 INFO - PROCESS | 1608 | ++DOMWINDOW == 41 (000000E3C7D1F800) [pid = 1608] [serial = 59] [outer = 000000E3C7D12000]
13:33:16 INFO - PROCESS | 1608 | 1483651996887 Marionette TRACE conn5 <- [1,56,null,{"value":["/XMLHttpRequest/abort-event-abort.htm",0,null,null,[["XMLHttpRequest: The abort() method: do not fire abort event in OPENED state when send() flag is unset. send() throws after abort().",0,null,null]]]}]
13:33:16 INFO - .
13:33:16 INFO - TEST-OK | /XMLHttpRequest/abort-event-abort.htm | took 523ms
13:33:16 INFO - PROCESS | 1608 | 1483651996907 Marionette TRACE conn5 -> [0,57,"getWindowHandle",null]
13:33:16 INFO - PROCESS | 1608 | 1483651996910 Marionette TRACE conn5 <- [1,57,null,{"value":"13"}]
13:33:16 INFO - TEST-START | /XMLHttpRequest/abort-event-listeners.htm
13:33:16 INFO - PROCESS | 1608 | 1483651996914 Marionette TRACE conn5 -> [0,58,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:17 INFO - PROCESS | 1608 | 1483651997001 Marionette TRACE conn5 <- [1,58,null,{"value":null}]
13:33:17 INFO - PROCESS | 1608 | 1483651997006 Marionette TRACE conn5 -> [0,59,"getWindowHandles",null]
13:33:17 INFO - PROCESS | 1608 | 1483651997009 Marionette TRACE conn5 <- [1,59,null,["13"]]
13:33:17 INFO - PROCESS | 1608 | 1483651997012 Marionette TRACE conn5 -> [0,60,"switchToWindow",{"name":"13"}]
13:33:17 INFO - PROCESS | 1608 | 1483651997015 Marionette TRACE conn5 <- [1,60,null,{}]
13:33:17 INFO - PROCESS | 1608 | 1483651997020 Marionette TRACE conn5 -> [0,61,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-listeners.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-listeners.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:17 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C89D2800 == 17 [pid = 1608] [id = 21]
13:33:17 INFO - PROCESS | 1608 | ++DOMWINDOW == 42 (000000E3C89D5800) [pid = 1608] [serial = 60] [outer = 0000000000000000]
13:33:17 INFO - PROCESS | 1608 | ++DOMWINDOW == 43 (000000E3C8B73800) [pid = 1608] [serial = 61] [outer = 000000E3C89D5800]
13:33:17 INFO - PROCESS | 1608 | 1483651997076 Marionette DEBUG loaded listener.js
13:33:17 INFO - PROCESS | 1608 | ++DOMWINDOW == 44 (000000E3C8B7A000) [pid = 1608] [serial = 62] [outer = 000000E3C89D5800]
13:33:17 INFO - PROCESS | 1608 | 1483651997411 Marionette TRACE conn5 <- [1,61,null,{"value":["/XMLHttpRequest/abort-event-listeners.htm",0,null,null,[["XMLHttpRequest: abort() should not reset event listeners",0,null,null]]]}]
13:33:17 INFO - .
13:33:17 INFO - TEST-OK | /XMLHttpRequest/abort-event-listeners.htm | took 524ms
13:33:17 INFO - PROCESS | 1608 | 1483651997440 Marionette TRACE conn5 -> [0,62,"getWindowHandle",null]
13:33:17 INFO - PROCESS | 1608 | 1483651997443 Marionette TRACE conn5 <- [1,62,null,{"value":"13"}]
13:33:17 INFO - TEST-START | /XMLHttpRequest/abort-event-loadend.htm
13:33:17 INFO - PROCESS | 1608 | 1483651997448 Marionette TRACE conn5 -> [0,63,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:17 INFO - PROCESS | 1608 | 1483651997537 Marionette TRACE conn5 <- [1,63,null,{"value":null}]
13:33:17 INFO - PROCESS | 1608 | 1483651997542 Marionette TRACE conn5 -> [0,64,"getWindowHandles",null]
13:33:17 INFO - PROCESS | 1608 | 1483651997545 Marionette TRACE conn5 <- [1,64,null,["13"]]
13:33:17 INFO - PROCESS | 1608 | 1483651997548 Marionette TRACE conn5 -> [0,65,"switchToWindow",{"name":"13"}]
13:33:17 INFO - PROCESS | 1608 | 1483651997551 Marionette TRACE conn5 <- [1,65,null,{}]
13:33:17 INFO - PROCESS | 1608 | 1483651997605 Marionette TRACE conn5 -> [0,66,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-loadend.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-loadend.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:17 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C8C32000 == 18 [pid = 1608] [id = 22]
13:33:17 INFO - PROCESS | 1608 | ++DOMWINDOW == 45 (000000E3C8C32800) [pid = 1608] [serial = 63] [outer = 0000000000000000]
13:33:17 INFO - PROCESS | 1608 | ++DOMWINDOW == 46 (000000E3C8C38800) [pid = 1608] [serial = 64] [outer = 000000E3C8C32800]
13:33:17 INFO - PROCESS | 1608 | 1483651997662 Marionette DEBUG loaded listener.js
13:33:17 INFO - PROCESS | 1608 | ++DOMWINDOW == 47 (000000E3C8DBE000) [pid = 1608] [serial = 65] [outer = 000000E3C8C32800]
13:33:17 INFO - PROCESS | 1608 | 1483651997949 Marionette TRACE conn5 <- [1,66,null,{"value":["/XMLHttpRequest/abort-event-loadend.htm",0,null,null,[["XMLHttpRequest: The abort() method: Fire a progress event named loadend",0,null,null]]]}]
13:33:17 INFO - .
13:33:17 INFO - TEST-OK | /XMLHttpRequest/abort-event-loadend.htm | took 524ms
13:33:17 INFO - PROCESS | 1608 | 1483651997974 Marionette TRACE conn5 -> [0,67,"getWindowHandle",null]
13:33:17 INFO - PROCESS | 1608 | 1483651997976 Marionette TRACE conn5 <- [1,67,null,{"value":"13"}]
13:33:17 INFO - TEST-START | /XMLHttpRequest/abort-event-order.htm
13:33:17 INFO - PROCESS | 1608 | 1483651997980 Marionette TRACE conn5 -> [0,68,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:18 INFO - PROCESS | 1608 | 1483651998068 Marionette TRACE conn5 <- [1,68,null,{"value":null}]
13:33:18 INFO - PROCESS | 1608 | 1483651998114 Marionette TRACE conn5 -> [0,69,"getWindowHandles",null]
13:33:18 INFO - PROCESS | 1608 | 1483651998116 Marionette TRACE conn5 <- [1,69,null,["13"]]
13:33:18 INFO - PROCESS | 1608 | 1483651998168 Marionette TRACE conn5 -> [0,70,"switchToWindow",{"name":"13"}]
13:33:18 INFO - PROCESS | 1608 | 1483651998171 Marionette TRACE conn5 <- [1,70,null,{}]
13:33:18 INFO - PROCESS | 1608 | 1483651998176 Marionette TRACE conn5 -> [0,71,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-event-order.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-event-order.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:18 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C9280000 == 19 [pid = 1608] [id = 23]
13:33:18 INFO - PROCESS | 1608 | ++DOMWINDOW == 48 (000000E3C9280800) [pid = 1608] [serial = 66] [outer = 0000000000000000]
13:33:18 INFO - PROCESS | 1608 | ++DOMWINDOW == 49 (000000E3C928A800) [pid = 1608] [serial = 67] [outer = 000000E3C9280800]
13:33:18 INFO - PROCESS | 1608 | 1483651998234 Marionette DEBUG loaded listener.js
13:33:18 INFO - PROCESS | 1608 | ++DOMWINDOW == 50 (000000E3C8FC9000) [pid = 1608] [serial = 68] [outer = 000000E3C9280800]
13:33:18 INFO - PROCESS | 1608 | 1483651998549 Marionette TRACE conn5 <- [1,71,null,{"value":["/XMLHttpRequest/abort-event-order.htm",0,null,null,[["XMLHttpRequest: The abort() method: abort and loadend events",0,null,null]]]}]
13:33:18 INFO - .
13:33:18 INFO - TEST-OK | /XMLHttpRequest/abort-event-order.htm | took 629ms
13:33:18 INFO - PROCESS | 1608 | 1483651998612 Marionette TRACE conn5 -> [0,72,"getWindowHandle",null]
13:33:18 INFO - PROCESS | 1608 | 1483651998614 Marionette TRACE conn5 <- [1,72,null,{"value":"13"}]
13:33:18 INFO - TEST-START | /XMLHttpRequest/abort-upload-event-abort.htm
13:33:18 INFO - PROCESS | 1608 | 1483651998619 Marionette TRACE conn5 -> [0,73,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:18 INFO - PROCESS | 1608 | 1483651998727 Marionette TRACE conn5 <- [1,73,null,{"value":null}]
13:33:18 INFO - PROCESS | 1608 | 1483651998732 Marionette TRACE conn5 -> [0,74,"getWindowHandles",null]
13:33:18 INFO - PROCESS | 1608 | 1483651998735 Marionette TRACE conn5 <- [1,74,null,["13"]]
13:33:18 INFO - PROCESS | 1608 | 1483651998739 Marionette TRACE conn5 -> [0,75,"switchToWindow",{"name":"13"}]
13:33:18 INFO - PROCESS | 1608 | 1483651998743 Marionette TRACE conn5 <- [1,75,null,{}]
13:33:18 INFO - PROCESS | 1608 | 1483651998747 Marionette TRACE conn5 -> [0,76,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-upload-event-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-abort.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:18 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C95DB000 == 20 [pid = 1608] [id = 24]
13:33:18 INFO - PROCESS | 1608 | ++DOMWINDOW == 51 (000000E3C9B16000) [pid = 1608] [serial = 69] [outer = 0000000000000000]
13:33:18 INFO - PROCESS | 1608 | ++DOMWINDOW == 52 (000000E3C9B8E800) [pid = 1608] [serial = 70] [outer = 000000E3C9B16000]
13:33:18 INFO - PROCESS | 1608 | 1483651998812 Marionette DEBUG loaded listener.js
13:33:18 INFO - PROCESS | 1608 | ++DOMWINDOW == 53 (000000E3C9EF1800) [pid = 1608] [serial = 71] [outer = 000000E3C9B16000]
13:33:19 INFO - PROCESS | 1608 | 1483651999176 Marionette TRACE conn5 <- [1,76,null,{"value":["/XMLHttpRequest/abort-upload-event-abort.htm",0,null,null,[["XMLHttpRequest: The abort() method: Fire a progress event named abort on the XMLHttpRequestUpload object",0,null,null]]]}]
13:33:19 INFO - .
13:33:19 INFO - TEST-OK | /XMLHttpRequest/abort-upload-event-abort.htm | took 587ms
13:33:19 INFO - PROCESS | 1608 | 1483651999208 Marionette TRACE conn5 -> [0,77,"getWindowHandle",null]
13:33:19 INFO - PROCESS | 1608 | 1483651999210 Marionette TRACE conn5 <- [1,77,null,{"value":"13"}]
13:33:19 INFO - TEST-START | /XMLHttpRequest/abort-upload-event-loadend.htm
13:33:19 INFO - PROCESS | 1608 | 1483651999215 Marionette TRACE conn5 -> [0,78,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:19 INFO - PROCESS | 1608 | 1483651999332 Marionette TRACE conn5 <- [1,78,null,{"value":null}]
13:33:19 INFO - PROCESS | 1608 | 1483651999339 Marionette TRACE conn5 -> [0,79,"getWindowHandles",null]
13:33:19 INFO - PROCESS | 1608 | 1483651999341 Marionette TRACE conn5 <- [1,79,null,["13"]]
13:33:19 INFO - PROCESS | 1608 | 1483651999344 Marionette TRACE conn5 -> [0,80,"switchToWindow",{"name":"13"}]
13:33:19 INFO - PROCESS | 1608 | 1483651999347 Marionette TRACE conn5 <- [1,80,null,{}]
13:33:19 INFO - PROCESS | 1608 | 1483651999351 Marionette TRACE conn5 -> [0,81,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/abort-upload-event-loadend.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-loadend.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:19 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CB722000 == 21 [pid = 1608] [id = 25]
13:33:19 INFO - PROCESS | 1608 | ++DOMWINDOW == 54 (000000E3CB723000) [pid = 1608] [serial = 72] [outer = 0000000000000000]
13:33:19 INFO - PROCESS | 1608 | ++DOMWINDOW == 55 (000000E3CB97F000) [pid = 1608] [serial = 73] [outer = 000000E3CB723000]
13:33:19 INFO - PROCESS | 1608 | 1483651999407 Marionette DEBUG loaded listener.js
13:33:19 INFO - PROCESS | 1608 | ++DOMWINDOW == 56 (000000E3CB998800) [pid = 1608] [serial = 74] [outer = 000000E3CB723000]
13:33:19 INFO - PROCESS | 1608 | 1483651999715 Marionette TRACE conn5 <- [1,81,null,{"value":["/XMLHttpRequest/abort-upload-event-loadend.htm",0,null,null,[["XMLHttpRequest: The abort() method: Fire a progress event named loadend on the XMLHttpRequestUpload object",0,null,null]]]}]
13:33:19 INFO - .
13:33:19 INFO - TEST-OK | /XMLHttpRequest/abort-upload-event-loadend.htm | took 523ms
13:33:19 INFO - PROCESS | 1608 | 1483651999740 Marionette TRACE conn5 -> [0,82,"getWindowHandle",null]
13:33:19 INFO - PROCESS | 1608 | 1483651999742 Marionette TRACE conn5 <- [1,82,null,{"value":"13"}]
13:33:19 INFO - TEST-START | /XMLHttpRequest/anonymous-mode-unsupported.htm
13:33:19 INFO - PROCESS | 1608 | 1483651999746 Marionette TRACE conn5 -> [0,83,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:19 INFO - PROCESS | 1608 | 1483651999834 Marionette TRACE conn5 <- [1,83,null,{"value":null}]
13:33:19 INFO - PROCESS | 1608 | 1483651999839 Marionette TRACE conn5 -> [0,84,"getWindowHandles",null]
13:33:19 INFO - PROCESS | 1608 | 1483651999841 Marionette TRACE conn5 <- [1,84,null,["13"]]
13:33:19 INFO - PROCESS | 1608 | 1483651999844 Marionette TRACE conn5 -> [0,85,"switchToWindow",{"name":"13"}]
13:33:19 INFO - PROCESS | 1608 | 1483651999848 Marionette TRACE conn5 <- [1,85,null,{}]
13:33:19 INFO - PROCESS | 1608 | 1483651999852 Marionette TRACE conn5 -> [0,86,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/anonymous-mode-unsupported.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/anonymous-mode-unsupported.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:19 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CCE8A000 == 22 [pid = 1608] [id = 26]
13:33:19 INFO - PROCESS | 1608 | ++DOMWINDOW == 57 (000000E3CCE8B000) [pid = 1608] [serial = 75] [outer = 0000000000000000]
13:33:19 INFO - PROCESS | 1608 | ++DOMWINDOW == 58 (000000E3CCE90800) [pid = 1608] [serial = 76] [outer = 000000E3CCE8B000]
13:33:19 INFO - PROCESS | 1608 | 1483651999906 Marionette DEBUG loaded listener.js
13:33:19 INFO - PROCESS | 1608 | ++DOMWINDOW == 59 (000000E3CCE99800) [pid = 1608] [serial = 77] [outer = 000000E3CCE8B000]
13:33:20 INFO - PROCESS | 1608 | 1483652000245 Marionette TRACE conn5 <- [1,86,null,{"value":["/XMLHttpRequest/anonymous-mode-unsupported.htm",0,null,null,[["XMLHttpRequest: anonymous mode unsupported",0,null,null]]]}]
13:33:20 INFO - .
13:33:20 INFO - TEST-OK | /XMLHttpRequest/anonymous-mode-unsupported.htm | took 524ms
13:33:20 INFO - PROCESS | 1608 | 1483652000273 Marionette TRACE conn5 -> [0,87,"getWindowHandle",null]
13:33:20 INFO - PROCESS | 1608 | 1483652000275 Marionette TRACE conn5 <- [1,87,null,{"value":"13"}]
13:33:20 INFO - TEST-START | /XMLHttpRequest/data-uri.htm
13:33:20 INFO - PROCESS | 1608 | 1483652000280 Marionette TRACE conn5 -> [0,88,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:20 INFO - PROCESS | 1608 | 1483652000390 Marionette TRACE conn5 <- [1,88,null,{"value":null}]
13:33:20 INFO - PROCESS | 1608 | 1483652000424 Marionette TRACE conn5 -> [0,89,"getWindowHandles",null]
13:33:20 INFO - PROCESS | 1608 | 1483652000426 Marionette TRACE conn5 <- [1,89,null,["13"]]
13:33:20 INFO - PROCESS | 1608 | 1483652000429 Marionette TRACE conn5 -> [0,90,"switchToWindow",{"name":"13"}]
13:33:20 INFO - PROCESS | 1608 | 1483652000432 Marionette TRACE conn5 <- [1,90,null,{}]
13:33:20 INFO - PROCESS | 1608 | 1483652000436 Marionette TRACE conn5 -> [0,91,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/data-uri.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/data-uri.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:20 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CD506000 == 23 [pid = 1608] [id = 27]
13:33:20 INFO - PROCESS | 1608 | ++DOMWINDOW == 60 (000000E3CD506800) [pid = 1608] [serial = 78] [outer = 0000000000000000]
13:33:20 INFO - PROCESS | 1608 | ++DOMWINDOW == 61 (000000E3CD516000) [pid = 1608] [serial = 79] [outer = 000000E3CD506800]
13:33:20 INFO - PROCESS | 1608 | 1483652000490 Marionette DEBUG loaded listener.js
13:33:20 INFO - PROCESS | 1608 | ++DOMWINDOW == 62 (000000E3CD59B800) [pid = 1608] [serial = 80] [outer = 000000E3CD506800]
13:33:20 INFO - PROCESS | 1608 | 1483652000855 Marionette TRACE conn5 <- [1,91,null,{"value":["/XMLHttpRequest/data-uri.htm",0,null,null,[["XHR method GET with charset text/plain",0,null,null],["XHR method GET with charset text/plain (base64)",0,null,null],["XHR method GET with charset text/html",0,null,null],["XHR method GET with charset text/html;charset=UTF-8",0,null,null],["XHR method GET with charset image/png",1,"assert_equals: expected \"Hello, World!\" but got \"Hello,World!\"","do_test/ [0,92,"getWindowHandle",null]
13:33:20 INFO - PROCESS | 1608 | 1483652000926 Marionette TRACE conn5 <- [1,92,null,{"value":"13"}]
13:33:20 INFO - TEST-START | /XMLHttpRequest/event-abort.htm
13:33:20 INFO - PROCESS | 1608 | 1483652000931 Marionette TRACE conn5 -> [0,93,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:21 INFO - PROCESS | 1608 | 1483652001020 Marionette TRACE conn5 <- [1,93,null,{"value":null}]
13:33:21 INFO - PROCESS | 1608 | 1483652001025 Marionette TRACE conn5 -> [0,94,"getWindowHandles",null]
13:33:21 INFO - PROCESS | 1608 | 1483652001027 Marionette TRACE conn5 <- [1,94,null,["13"]]
13:33:21 INFO - PROCESS | 1608 | 1483652001030 Marionette TRACE conn5 -> [0,95,"switchToWindow",{"name":"13"}]
13:33:21 INFO - PROCESS | 1608 | 1483652001034 Marionette TRACE conn5 <- [1,95,null,{}]
13:33:21 INFO - PROCESS | 1608 | 1483652001038 Marionette TRACE conn5 -> [0,96,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-abort.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:21 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CDFF6000 == 24 [pid = 1608] [id = 28]
13:33:21 INFO - PROCESS | 1608 | ++DOMWINDOW == 63 (000000E3CDFF6800) [pid = 1608] [serial = 81] [outer = 0000000000000000]
13:33:21 INFO - PROCESS | 1608 | ++DOMWINDOW == 64 (000000E3CE190800) [pid = 1608] [serial = 82] [outer = 000000E3CDFF6800]
13:33:21 INFO - PROCESS | 1608 | 1483652001094 Marionette DEBUG loaded listener.js
13:33:21 INFO - PROCESS | 1608 | ++DOMWINDOW == 65 (000000E3CE196800) [pid = 1608] [serial = 83] [outer = 000000E3CDFF6800]
13:33:21 INFO - PROCESS | 1608 | 1483652001433 Marionette TRACE conn5 <- [1,96,null,{"value":["/XMLHttpRequest/event-abort.htm",0,null,null,[["XMLHttpRequest: abort event",0,null,null]]]}]
13:33:21 INFO - .
13:33:21 INFO - TEST-OK | /XMLHttpRequest/event-abort.htm | took 522ms
13:33:21 INFO - PROCESS | 1608 | 1483652001457 Marionette TRACE conn5 -> [0,97,"getWindowHandle",null]
13:33:21 INFO - PROCESS | 1608 | 1483652001460 Marionette TRACE conn5 <- [1,97,null,{"value":"13"}]
13:33:21 INFO - TEST-START | /XMLHttpRequest/event-error-order.sub.html
13:33:21 INFO - PROCESS | 1608 | 1483652001464 Marionette TRACE conn5 -> [0,98,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:21 INFO - PROCESS | 1608 | 1483652001551 Marionette TRACE conn5 <- [1,98,null,{"value":null}]
13:33:21 INFO - PROCESS | 1608 | 1483652001557 Marionette TRACE conn5 -> [0,99,"getWindowHandles",null]
13:33:21 INFO - PROCESS | 1608 | 1483652001559 Marionette TRACE conn5 <- [1,99,null,["13"]]
13:33:21 INFO - PROCESS | 1608 | 1483652001562 Marionette TRACE conn5 -> [0,100,"switchToWindow",{"name":"13"}]
13:33:21 INFO - PROCESS | 1608 | 1483652001565 Marionette TRACE conn5 <- [1,100,null,{}]
13:33:21 INFO - PROCESS | 1608 | 1483652001569 Marionette TRACE conn5 -> [0,101,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-error-order.sub.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-error-order.sub.html\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:21 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CE1AD000 == 25 [pid = 1608] [id = 29]
13:33:21 INFO - PROCESS | 1608 | ++DOMWINDOW == 66 (000000E3CE302800) [pid = 1608] [serial = 84] [outer = 0000000000000000]
13:33:21 INFO - PROCESS | 1608 | ++DOMWINDOW == 67 (000000E3CE308000) [pid = 1608] [serial = 85] [outer = 000000E3CE302800]
13:33:21 INFO - PROCESS | 1608 | 1483652001678 Marionette DEBUG loaded listener.js
13:33:21 INFO - PROCESS | 1608 | ++DOMWINDOW == 68 (000000E3CE312000) [pid = 1608] [serial = 86] [outer = 000000E3CE302800]
13:33:21 INFO - PROCESS | 1608 | [1608] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x804B001E: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 553
13:33:21 INFO - PROCESS | 1608 | [1608] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x805303F4: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 1293
13:33:21 INFO - PROCESS | 1608 | [1608] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x805303F4: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 553
13:33:21 INFO - PROCESS | 1608 | 1483652001986 Marionette TRACE conn5 <- [1,101,null,{"value":["/XMLHttpRequest/event-error-order.sub.html",0,null,null,[["XMLHttpRequest: event - error (order of events)",0,null,null]]]}]
13:33:22 INFO - .
13:33:22 INFO - TEST-OK | /XMLHttpRequest/event-error-order.sub.html | took 587ms
13:33:22 INFO - PROCESS | 1608 | 1483652002054 Marionette TRACE conn5 -> [0,102,"getWindowHandle",null]
13:33:22 INFO - PROCESS | 1608 | 1483652002056 Marionette TRACE conn5 <- [1,102,null,{"value":"13"}]
13:33:22 INFO - TEST-START | /XMLHttpRequest/event-error.sub.html
13:33:22 INFO - PROCESS | 1608 | 1483652002061 Marionette TRACE conn5 -> [0,103,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:22 INFO - PROCESS | 1608 | 1483652002154 Marionette TRACE conn5 <- [1,103,null,{"value":null}]
13:33:22 INFO - PROCESS | 1608 | 1483652002211 Marionette TRACE conn5 -> [0,104,"getWindowHandles",null]
13:33:22 INFO - PROCESS | 1608 | 1483652002214 Marionette TRACE conn5 <- [1,104,null,["13"]]
13:33:22 INFO - PROCESS | 1608 | 1483652002217 Marionette TRACE conn5 -> [0,105,"switchToWindow",{"name":"13"}]
13:33:22 INFO - PROCESS | 1608 | 1483652002220 Marionette TRACE conn5 <- [1,105,null,{}]
13:33:22 INFO - PROCESS | 1608 | 1483652002224 Marionette TRACE conn5 -> [0,106,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-error.sub.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-error.sub.html\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:22 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CE743800 == 26 [pid = 1608] [id = 30]
13:33:22 INFO - PROCESS | 1608 | ++DOMWINDOW == 69 (000000E3CE744000) [pid = 1608] [serial = 87] [outer = 0000000000000000]
13:33:22 INFO - PROCESS | 1608 | ++DOMWINDOW == 70 (000000E3CE748800) [pid = 1608] [serial = 88] [outer = 000000E3CE744000]
13:33:22 INFO - PROCESS | 1608 | 1483652002277 Marionette DEBUG loaded listener.js
13:33:22 INFO - PROCESS | 1608 | ++DOMWINDOW == 71 (000000E3CEB1B000) [pid = 1608] [serial = 89] [outer = 000000E3CE744000]
13:33:22 INFO - PROCESS | 1608 | [1608] WARNING: NS_ENSURE_SUCCESS(status, status) failed with result 0x804B001E: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/netwerk/protocol/http/nsCORSListenerProxy.cpp, line 553
13:33:22 INFO - PROCESS | 1608 | 1483652002651 Marionette TRACE conn5 <- [1,106,null,{"value":["/XMLHttpRequest/event-error.sub.html",0,null,null,[["XMLHttpRequest Test: event - error",0,null,null]]]}]
13:33:22 INFO - .
13:33:22 INFO - TEST-OK | /XMLHttpRequest/event-error.sub.html | took 629ms
13:33:22 INFO - PROCESS | 1608 | 1483652002693 Marionette TRACE conn5 -> [0,107,"getWindowHandle",null]
13:33:22 INFO - PROCESS | 1608 | 1483652002699 Marionette TRACE conn5 <- [1,107,null,{"value":"13"}]
13:33:22 INFO - TEST-START | /XMLHttpRequest/event-load.htm
13:33:22 INFO - PROCESS | 1608 | 1483652002707 Marionette TRACE conn5 -> [0,108,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:22 INFO - PROCESS | 1608 | 1483652002877 Marionette TRACE conn5 <- [1,108,null,{"value":null}]
13:33:22 INFO - PROCESS | 1608 | 1483652002936 Marionette TRACE conn5 -> [0,109,"getWindowHandles",null]
13:33:22 INFO - PROCESS | 1608 | 1483652002941 Marionette TRACE conn5 <- [1,109,null,["13"]]
13:33:22 INFO - PROCESS | 1608 | 1483652002988 Marionette TRACE conn5 -> [0,110,"switchToWindow",{"name":"13"}]
13:33:23 INFO - PROCESS | 1608 | 1483652002995 Marionette TRACE conn5 <- [1,110,null,{}]
13:33:23 INFO - PROCESS | 1608 | 1483652003003 Marionette TRACE conn5 -> [0,111,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-load.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-load.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:23 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3BD328000 == 27 [pid = 1608] [id = 31]
13:33:23 INFO - PROCESS | 1608 | ++DOMWINDOW == 72 (000000E3BD334800) [pid = 1608] [serial = 90] [outer = 0000000000000000]
13:33:23 INFO - PROCESS | 1608 | ++DOMWINDOW == 73 (000000E3BD3E4800) [pid = 1608] [serial = 91] [outer = 000000E3BD334800]
13:33:23 INFO - PROCESS | 1608 | 1483652003081 Marionette DEBUG loaded listener.js
13:33:23 INFO - PROCESS | 1608 | ++DOMWINDOW == 74 (000000E3C07DC000) [pid = 1608] [serial = 92] [outer = 000000E3BD334800]
13:33:23 INFO - PROCESS | 1608 | 1483652003518 Marionette TRACE conn5 <- [1,111,null,{"value":["/XMLHttpRequest/event-load.htm",0,null,null,[["XMLHttpRequest: The send() method: Fire an event named load (synchronous flag is unset)",0,null,null]]]}]
13:33:23 INFO - .
13:33:23 INFO - TEST-OK | /XMLHttpRequest/event-load.htm | took 838ms
13:33:23 INFO - PROCESS | 1608 | 1483652003544 Marionette TRACE conn5 -> [0,112,"getWindowHandle",null]
13:33:23 INFO - PROCESS | 1608 | 1483652003549 Marionette TRACE conn5 <- [1,112,null,{"value":"13"}]
13:33:23 INFO - TEST-START | /XMLHttpRequest/event-loadend.htm
13:33:23 INFO - PROCESS | 1608 | 1483652003554 Marionette TRACE conn5 -> [0,113,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:23 INFO - PROCESS | 1608 | 1483652003685 Marionette TRACE conn5 <- [1,113,null,{"value":null}]
13:33:23 INFO - PROCESS | 1608 | 1483652003745 Marionette TRACE conn5 -> [0,114,"getWindowHandles",null]
13:33:23 INFO - PROCESS | 1608 | 1483652003748 Marionette TRACE conn5 <- [1,114,null,["13"]]
13:33:23 INFO - PROCESS | 1608 | 1483652003753 Marionette TRACE conn5 -> [0,115,"switchToWindow",{"name":"13"}]
13:33:23 INFO - PROCESS | 1608 | 1483652003757 Marionette TRACE conn5 <- [1,115,null,{}]
13:33:23 INFO - PROCESS | 1608 | 1483652003762 Marionette TRACE conn5 -> [0,116,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-loadend.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-loadend.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:23 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C63C0800 == 28 [pid = 1608] [id = 32]
13:33:23 INFO - PROCESS | 1608 | ++DOMWINDOW == 75 (000000E3C63C1000) [pid = 1608] [serial = 93] [outer = 0000000000000000]
13:33:23 INFO - PROCESS | 1608 | ++DOMWINDOW == 76 (000000E3C7160800) [pid = 1608] [serial = 94] [outer = 000000E3C63C1000]
13:33:23 INFO - PROCESS | 1608 | 1483652003875 Marionette DEBUG loaded listener.js
13:33:23 INFO - PROCESS | 1608 | ++DOMWINDOW == 77 (000000E3C77C1800) [pid = 1608] [serial = 95] [outer = 000000E3C63C1000]
13:33:24 INFO - PROCESS | 1608 | 1483652004307 Marionette TRACE conn5 <- [1,116,null,{"value":["/XMLHttpRequest/event-loadend.htm",0,null,null,[["XMLHttpRequest: loadend event",0,null,null]]]}]
13:33:24 INFO - .
13:33:24 INFO - TEST-OK | /XMLHttpRequest/event-loadend.htm | took 776ms
13:33:24 INFO - PROCESS | 1608 | 1483652004342 Marionette TRACE conn5 -> [0,117,"getWindowHandle",null]
13:33:24 INFO - PROCESS | 1608 | 1483652004348 Marionette TRACE conn5 <- [1,117,null,{"value":"13"}]
13:33:24 INFO - TEST-START | /XMLHttpRequest/event-loadstart.htm
13:33:24 INFO - PROCESS | 1608 | 1483652004353 Marionette TRACE conn5 -> [0,118,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:24 INFO - PROCESS | 1608 | 1483652004479 Marionette TRACE conn5 <- [1,118,null,{"value":null}]
13:33:24 INFO - PROCESS | 1608 | 1483652004540 Marionette TRACE conn5 -> [0,119,"getWindowHandles",null]
13:33:24 INFO - PROCESS | 1608 | 1483652004544 Marionette TRACE conn5 <- [1,119,null,["13"]]
13:33:24 INFO - PROCESS | 1608 | 1483652004548 Marionette TRACE conn5 -> [0,120,"switchToWindow",{"name":"13"}]
13:33:24 INFO - PROCESS | 1608 | 1483652004554 Marionette TRACE conn5 <- [1,120,null,{}]
13:33:24 INFO - PROCESS | 1608 | 1483652004558 Marionette TRACE conn5 -> [0,121,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-loadstart.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-loadstart.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:24 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CBA8D800 == 29 [pid = 1608] [id = 33]
13:33:24 INFO - PROCESS | 1608 | ++DOMWINDOW == 78 (000000E3CBA8E800) [pid = 1608] [serial = 96] [outer = 0000000000000000]
13:33:24 INFO - PROCESS | 1608 | ++DOMWINDOW == 79 (000000E3CCE98000) [pid = 1608] [serial = 97] [outer = 000000E3CBA8E800]
13:33:24 INFO - PROCESS | 1608 | 1483652004672 Marionette DEBUG loaded listener.js
13:33:24 INFO - PROCESS | 1608 | ++DOMWINDOW == 80 (000000E3CDFF1000) [pid = 1608] [serial = 98] [outer = 000000E3CBA8E800]
13:33:25 INFO - PROCESS | 1608 | 1483652005106 Marionette TRACE conn5 <- [1,121,null,{"value":["/XMLHttpRequest/event-loadstart.htm",0,null,null,[["XMLHttpRequest: loadstart event",0,null,null]]]}]
13:33:25 INFO - .
13:33:25 INFO - TEST-OK | /XMLHttpRequest/event-loadstart.htm | took 776ms
13:33:25 INFO - PROCESS | 1608 | 1483652005130 Marionette TRACE conn5 -> [0,122,"getWindowHandle",null]
13:33:25 INFO - PROCESS | 1608 | 1483652005133 Marionette TRACE conn5 <- [1,122,null,{"value":"13"}]
13:33:25 INFO - TEST-START | /XMLHttpRequest/event-progress.htm
13:33:25 INFO - PROCESS | 1608 | 1483652005139 Marionette TRACE conn5 -> [0,123,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:25 INFO - PROCESS | 1608 | 1483652005264 Marionette TRACE conn5 <- [1,123,null,{"value":null}]
13:33:25 INFO - PROCESS | 1608 | 1483652005323 Marionette TRACE conn5 -> [0,124,"getWindowHandles",null]
13:33:25 INFO - PROCESS | 1608 | 1483652005327 Marionette TRACE conn5 <- [1,124,null,["13"]]
13:33:25 INFO - PROCESS | 1608 | 1483652005331 Marionette TRACE conn5 -> [0,125,"switchToWindow",{"name":"13"}]
13:33:25 INFO - PROCESS | 1608 | 1483652005336 Marionette TRACE conn5 <- [1,125,null,{}]
13:33:25 INFO - PROCESS | 1608 | 1483652005340 Marionette TRACE conn5 -> [0,126,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-progress.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-progress.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:25 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CEB13000 == 30 [pid = 1608] [id = 34]
13:33:25 INFO - PROCESS | 1608 | ++DOMWINDOW == 81 (000000E3CEB13800) [pid = 1608] [serial = 99] [outer = 0000000000000000]
13:33:25 INFO - PROCESS | 1608 | ++DOMWINDOW == 82 (000000E3CEB18000) [pid = 1608] [serial = 100] [outer = 000000E3CEB13800]
13:33:25 INFO - PROCESS | 1608 | 1483652005454 Marionette DEBUG loaded listener.js
13:33:25 INFO - PROCESS | 1608 | ++DOMWINDOW == 83 (000000E3CEB21000) [pid = 1608] [serial = 101] [outer = 000000E3CEB13800]
13:33:28 INFO - PROCESS | 1608 | 1483652008830 Marionette TRACE conn5 <- [1,126,null,{"value":["/XMLHttpRequest/event-progress.htm",0,null,null,[["XMLHttpRequest: The send() method: Fire a progress event named progress (synchronous flag is unset)",0,null,null]]]}]
13:33:28 INFO - .
13:33:28 INFO - TEST-OK | /XMLHttpRequest/event-progress.htm | took 3755ms
13:33:28 INFO - PROCESS | 1608 | 1483652008896 Marionette TRACE conn5 -> [0,127,"getWindowHandle",null]
13:33:28 INFO - PROCESS | 1608 | 1483652008899 Marionette TRACE conn5 <- [1,127,null,{"value":"13"}]
13:33:28 INFO - TEST-START | /XMLHttpRequest/event-readystate-sync-open.htm
13:33:28 INFO - PROCESS | 1608 | 1483652008906 Marionette TRACE conn5 -> [0,128,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:29 INFO - PROCESS | 1608 | 1483652009032 Marionette TRACE conn5 <- [1,128,null,{"value":null}]
13:33:29 INFO - PROCESS | 1608 | 1483652009073 Marionette TRACE conn5 -> [0,129,"getWindowHandles",null]
13:33:29 INFO - PROCESS | 1608 | 1483652009076 Marionette TRACE conn5 <- [1,129,null,["13"]]
13:33:29 INFO - PROCESS | 1608 | 1483652009081 Marionette TRACE conn5 -> [0,130,"switchToWindow",{"name":"13"}]
13:33:29 INFO - PROCESS | 1608 | 1483652009086 Marionette TRACE conn5 <- [1,130,null,{}]
13:33:29 INFO - PROCESS | 1608 | 1483652009090 Marionette TRACE conn5 -> [0,131,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-readystate-sync-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-readystate-sync-open.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:29 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C0635000 == 31 [pid = 1608] [id = 35]
13:33:29 INFO - PROCESS | 1608 | ++DOMWINDOW == 84 (000000E3C0729000) [pid = 1608] [serial = 102] [outer = 0000000000000000]
13:33:29 INFO - PROCESS | 1608 | ++DOMWINDOW == 85 (000000E3C09A4000) [pid = 1608] [serial = 103] [outer = 000000E3C0729000]
13:33:29 INFO - PROCESS | 1608 | 1483652009151 Marionette DEBUG loaded listener.js
13:33:29 INFO - PROCESS | 1608 | ++DOMWINDOW == 86 (000000E3C1524000) [pid = 1608] [serial = 104] [outer = 000000E3C0729000]
13:33:29 INFO - PROCESS | 1608 | 1483652009563 Marionette TRACE conn5 <- [1,131,null,{"value":["/XMLHttpRequest/event-readystate-sync-open.htm",0,null,null,[["XMLHttpRequest: open() call fires sync readystate event (sync)",0,null,null],["XMLHttpRequest: open() call fires sync readystate event (async)",0,null,null]]]}]
13:33:29 INFO - ..
13:33:29 INFO - TEST-OK | /XMLHttpRequest/event-readystate-sync-open.htm | took 670ms
13:33:29 INFO - PROCESS | 1608 | 1483652009578 Marionette TRACE conn5 -> [0,132,"getWindowHandle",null]
13:33:29 INFO - PROCESS | 1608 | 1483652009582 Marionette TRACE conn5 <- [1,132,null,{"value":"13"}]
13:33:29 INFO - TEST-START | /XMLHttpRequest/event-readystatechange-loaded.htm
13:33:29 INFO - PROCESS | 1608 | 1483652009586 Marionette TRACE conn5 -> [0,133,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:29 INFO - PROCESS | 1608 | 1483652009726 Marionette TRACE conn5 <- [1,133,null,{"value":null}]
13:33:29 INFO - PROCESS | 1608 | 1483652009732 Marionette TRACE conn5 -> [0,134,"getWindowHandles",null]
13:33:29 INFO - PROCESS | 1608 | 1483652009735 Marionette TRACE conn5 <- [1,134,null,["13"]]
13:33:29 INFO - PROCESS | 1608 | 1483652009772 Marionette TRACE conn5 -> [0,135,"switchToWindow",{"name":"13"}]
13:33:29 INFO - PROCESS | 1608 | 1483652009776 Marionette TRACE conn5 <- [1,135,null,{}]
13:33:29 INFO - PROCESS | 1608 | 1483652009780 Marionette TRACE conn5 -> [0,136,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-readystatechange-loaded.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:29 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C4F6A000 == 32 [pid = 1608] [id = 36]
13:33:29 INFO - PROCESS | 1608 | ++DOMWINDOW == 87 (000000E3C4F6A800) [pid = 1608] [serial = 105] [outer = 0000000000000000]
13:33:29 INFO - PROCESS | 1608 | ++DOMWINDOW == 88 (000000E3C5F91800) [pid = 1608] [serial = 106] [outer = 000000E3C4F6A800]
13:33:29 INFO - PROCESS | 1608 | 1483652009841 Marionette DEBUG loaded listener.js
13:33:29 INFO - PROCESS | 1608 | ++DOMWINDOW == 89 (000000E3C63AD800) [pid = 1608] [serial = 107] [outer = 000000E3C4F6A800]
13:33:30 INFO - PROCESS | 1608 | --DOMWINDOW == 88 (000000E3C0485800) [pid = 1608] [serial = 41] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-done.htm]
13:33:30 INFO - PROCESS | 1608 | --DOMWINDOW == 87 (000000E3BD319000) [pid = 1608] [serial = 29] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-stop.htm]
13:33:30 INFO - PROCESS | 1608 | --DOMWINDOW == 86 (000000E3C09A9800) [pid = 1608] [serial = 45] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-open.htm]
13:33:30 INFO - PROCESS | 1608 | --DOMWINDOW == 85 (000000E3C89D5800) [pid = 1608] [serial = 60] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-listeners.htm]
13:33:30 INFO - PROCESS | 1608 | --DOMWINDOW == 84 (000000E3BC40F000) [pid = 1608] [serial = 38] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-after-timeout.htm]
13:33:30 INFO - PROCESS | 1608 | --DOMWINDOW == 83 (000000E3C7170800) [pid = 1608] [serial = 54] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-upload.htm]
13:33:30 INFO - PROCESS | 1608 | --DOMWINDOW == 82 (000000E3C5FA2000) [pid = 1608] [serial = 51] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-unsent.htm]
13:33:30 INFO - PROCESS | 1608 | --DOMWINDOW == 81 (000000E3C2376800) [pid = 1608] [serial = 48] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-during-open.worker]
13:33:30 INFO - PROCESS | 1608 | --DOMWINDOW == 80 (000000E3C8C32800) [pid = 1608] [serial = 63] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-loadend.htm]
13:33:30 INFO - PROCESS | 1608 | --DOMWINDOW == 79 (000000E3CB723000) [pid = 1608] [serial = 72] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-loadend.htm]
13:33:30 INFO - PROCESS | 1608 | --DOMWINDOW == 78 (000000E3C9B16000) [pid = 1608] [serial = 69] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-upload-event-abort.htm]
13:33:30 INFO - PROCESS | 1608 | --DOMWINDOW == 77 (000000E3CCE8B000) [pid = 1608] [serial = 75] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/anonymous-mode-unsupported.htm]
13:33:30 INFO - PROCESS | 1608 | --DOMWINDOW == 76 (000000E3CDFF6800) [pid = 1608] [serial = 81] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-abort.htm]
13:33:30 INFO - PROCESS | 1608 | --DOMWINDOW == 75 (000000E3C7D12000) [pid = 1608] [serial = 57] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-abort.htm]
13:33:30 INFO - PROCESS | 1608 | --DOMWINDOW == 74 (000000E3CE302800) [pid = 1608] [serial = 84] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-error-order.sub.html]
13:33:30 INFO - PROCESS | 1608 | --DOMWINDOW == 73 (000000E3CD506800) [pid = 1608] [serial = 78] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/data-uri.htm]
13:33:30 INFO - PROCESS | 1608 | --DOMWINDOW == 72 (000000E3C9280800) [pid = 1608] [serial = 66] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/abort-event-order.htm]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3C9280000 == 31 [pid = 1608] [id = 23]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3CDFF6000 == 30 [pid = 1608] [id = 28]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3CE1AD000 == 29 [pid = 1608] [id = 29]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3CD506000 == 28 [pid = 1608] [id = 27]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3CCE8A000 == 27 [pid = 1608] [id = 26]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3C5FA0800 == 26 [pid = 1608] [id = 18]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3C95DB000 == 25 [pid = 1608] [id = 24]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3CB722000 == 24 [pid = 1608] [id = 25]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3C8C32000 == 23 [pid = 1608] [id = 22]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3C7D11800 == 22 [pid = 1608] [id = 20]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3C89D2800 == 21 [pid = 1608] [id = 21]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3C7170000 == 20 [pid = 1608] [id = 19]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3BC41B000 == 19 [pid = 1608] [id = 15]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3C09A9000 == 18 [pid = 1608] [id = 16]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3BD30E800 == 17 [pid = 1608] [id = 11]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3C2376000 == 16 [pid = 1608] [id = 17]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3BC40C000 == 15 [pid = 1608] [id = 14]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3C0635000 == 14 [pid = 1608] [id = 35]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3CEB13000 == 13 [pid = 1608] [id = 34]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3CBA8D800 == 12 [pid = 1608] [id = 33]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3C63C0800 == 11 [pid = 1608] [id = 32]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3BD328000 == 10 [pid = 1608] [id = 31]
13:33:34 INFO - PROCESS | 1608 | --DOCSHELL 000000E3CE743800 == 9 [pid = 1608] [id = 30]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 71 (000000E3CE308000) [pid = 1608] [serial = 85] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 70 (000000E3CE312000) [pid = 1608] [serial = 86] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 69 (000000E3CE190800) [pid = 1608] [serial = 82] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 68 (000000E3CE196800) [pid = 1608] [serial = 83] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 67 (000000E3CD516000) [pid = 1608] [serial = 79] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 66 (000000E3CD59B800) [pid = 1608] [serial = 80] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 65 (000000E3CCE90800) [pid = 1608] [serial = 76] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 64 (000000E3CCE99800) [pid = 1608] [serial = 77] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 63 (000000E3CB97F000) [pid = 1608] [serial = 73] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 62 (000000E3CB998800) [pid = 1608] [serial = 74] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 61 (000000E3C9B8E800) [pid = 1608] [serial = 70] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 60 (000000E3C9EF1800) [pid = 1608] [serial = 71] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 59 (000000E3C928A800) [pid = 1608] [serial = 67] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 58 (000000E3C8FC9000) [pid = 1608] [serial = 68] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 57 (000000E3C8C38800) [pid = 1608] [serial = 64] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 56 (000000E3C8DBE000) [pid = 1608] [serial = 65] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 55 (000000E3C8B73800) [pid = 1608] [serial = 61] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 54 (000000E3C8B7A000) [pid = 1608] [serial = 62] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 53 (000000E3C7D1D000) [pid = 1608] [serial = 58] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 52 (000000E3C7D1F800) [pid = 1608] [serial = 59] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 51 (000000E3C7670000) [pid = 1608] [serial = 55] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 50 (000000E3C768B800) [pid = 1608] [serial = 56] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 49 (000000E3C5FA9800) [pid = 1608] [serial = 52] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 48 (000000E3C5FB0000) [pid = 1608] [serial = 53] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 47 (000000E3C26AE000) [pid = 1608] [serial = 49] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 46 (000000E3C26B3800) [pid = 1608] [serial = 50] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 45 (000000E3C09B4000) [pid = 1608] [serial = 46] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 44 (000000E3C0C46000) [pid = 1608] [serial = 47] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 43 (000000E3C048B000) [pid = 1608] [serial = 42] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 42 (000000E3C0738800) [pid = 1608] [serial = 43] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 41 (000000E3BC41F000) [pid = 1608] [serial = 39] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 40 (000000E3BC9DF000) [pid = 1608] [serial = 40] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 39 (000000E3BB2C8000) [pid = 1608] [serial = 37] [outer = 0000000000000000] [url = about:neterror?e=dnsNotFound&u=https%3A//%25%28server%29s/selfsupport-dummy/&c=UTF-8&f=regular&d=Firefox%20can%E2%80%99t%20find%20the%20server%20at%20%25%28server%29s.]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 38 (000000E3C09A5800) [pid = 1608] [serial = 31] [outer = 0000000000000000] [url = about:blank]
13:33:34 INFO - PROCESS | 1608 | --DOMWINDOW == 37 (000000E3CE748800) [pid = 1608] [serial = 88] [outer = 0000000000000000] [url = about:blank]
13:33:36 INFO - PROCESS | 1608 | 1483652016186 Marionette TRACE conn5 <- [1,136,null,{"value":["/XMLHttpRequest/event-readystatechange-loaded.htm",0,null,null,[["XMLHttpRequest: the LOADING state change should only happen once",1,"assert_equals: LOADING state change may only be emitted once expected 1 but got 10","client.onreadystatechange<@http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm:29:13\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\nTest.prototype.step_func/<@http://web-platform.test:8000/resources/testharness.js:1425:20\nEventHandlerNonNull*@http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm:23:33\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\n@http://web-platform.test:8000/XMLHttpRequest/event-readystatechange-loaded.htm:19:1\n"]]]}]
13:33:36 INFO - .
13:33:36 INFO - TEST-OK | /XMLHttpRequest/event-readystatechange-loaded.htm | took 6625ms
13:33:36 INFO - PROCESS | 1608 | 1483652016213 Marionette TRACE conn5 -> [0,137,"getWindowHandle",null]
13:33:36 INFO - PROCESS | 1608 | 1483652016219 Marionette TRACE conn5 <- [1,137,null,{"value":"13"}]
13:33:36 INFO - TEST-START | /XMLHttpRequest/event-timeout-order.htm
13:33:36 INFO - PROCESS | 1608 | 1483652016227 Marionette TRACE conn5 -> [0,138,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:36 INFO - PROCESS | 1608 | 1483652016347 Marionette TRACE conn5 <- [1,138,null,{"value":null}]
13:33:36 INFO - PROCESS | 1608 | 1483652016399 Marionette TRACE conn5 -> [0,139,"getWindowHandles",null]
13:33:36 INFO - PROCESS | 1608 | 1483652016404 Marionette TRACE conn5 <- [1,139,null,["13"]]
13:33:36 INFO - PROCESS | 1608 | 1483652016409 Marionette TRACE conn5 -> [0,140,"switchToWindow",{"name":"13"}]
13:33:36 INFO - PROCESS | 1608 | 1483652016416 Marionette TRACE conn5 <- [1,140,null,{}]
13:33:36 INFO - PROCESS | 1608 | 1483652016420 Marionette TRACE conn5 -> [0,141,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-timeout-order.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-timeout-order.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:36 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3BC405000 == 10 [pid = 1608] [id = 37]
13:33:36 INFO - PROCESS | 1608 | ++DOMWINDOW == 38 (000000E3BC407800) [pid = 1608] [serial = 108] [outer = 0000000000000000]
13:33:36 INFO - PROCESS | 1608 | ++DOMWINDOW == 39 (000000E3BC41E800) [pid = 1608] [serial = 109] [outer = 000000E3BC407800]
13:33:36 INFO - PROCESS | 1608 | 1483652016486 Marionette DEBUG loaded listener.js
13:33:36 INFO - PROCESS | 1608 | ++DOMWINDOW == 40 (000000E3BC9E2800) [pid = 1608] [serial = 110] [outer = 000000E3BC407800]
13:33:36 INFO - PROCESS | 1608 | 1483652016869 Marionette TRACE conn5 <- [1,141,null,{"value":["/XMLHttpRequest/event-timeout-order.htm",0,null,null,[["XMLHttpRequest: event - timeout (order of events)",0,null,null]]]}]
13:33:36 INFO - .
13:33:36 INFO - TEST-OK | /XMLHttpRequest/event-timeout-order.htm | took 671ms
13:33:36 INFO - PROCESS | 1608 | 1483652016898 Marionette TRACE conn5 -> [0,142,"getWindowHandle",null]
13:33:36 INFO - PROCESS | 1608 | 1483652016902 Marionette TRACE conn5 <- [1,142,null,{"value":"13"}]
13:33:36 INFO - TEST-START | /XMLHttpRequest/event-timeout.htm
13:33:36 INFO - PROCESS | 1608 | 1483652016907 Marionette TRACE conn5 -> [0,143,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:37 INFO - PROCESS | 1608 | 1483652017045 Marionette TRACE conn5 <- [1,143,null,{"value":null}]
13:33:37 INFO - PROCESS | 1608 | 1483652017081 Marionette TRACE conn5 -> [0,144,"getWindowHandles",null]
13:33:37 INFO - PROCESS | 1608 | 1483652017085 Marionette TRACE conn5 <- [1,144,null,["13"]]
13:33:37 INFO - PROCESS | 1608 | 1483652017136 Marionette TRACE conn5 -> [0,145,"switchToWindow",{"name":"13"}]
13:33:37 INFO - PROCESS | 1608 | 1483652017140 Marionette TRACE conn5 <- [1,145,null,{}]
13:33:37 INFO - PROCESS | 1608 | 1483652017144 Marionette TRACE conn5 -> [0,146,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-timeout.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-timeout.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:37 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3BC121800 == 11 [pid = 1608] [id = 38]
13:33:37 INFO - PROCESS | 1608 | ++DOMWINDOW == 41 (000000E3C0747800) [pid = 1608] [serial = 111] [outer = 0000000000000000]
13:33:37 INFO - PROCESS | 1608 | ++DOMWINDOW == 42 (000000E3C09A2000) [pid = 1608] [serial = 112] [outer = 000000E3C0747800]
13:33:37 INFO - PROCESS | 1608 | 1483652017205 Marionette DEBUG loaded listener.js
13:33:37 INFO - PROCESS | 1608 | ++DOMWINDOW == 43 (000000E3C09C1000) [pid = 1608] [serial = 113] [outer = 000000E3C0747800]
13:33:37 INFO - PROCESS | 1608 | 1483652017614 Marionette TRACE conn5 <- [1,146,null,{"value":["/XMLHttpRequest/event-timeout.htm",0,null,null,[["XMLHttpRequest: timeout event",0,null,null]]]}]
13:33:37 INFO - .
13:33:37 INFO - TEST-OK | /XMLHttpRequest/event-timeout.htm | took 734ms
13:33:37 INFO - PROCESS | 1608 | 1483652017656 Marionette TRACE conn5 -> [0,147,"getWindowHandle",null]
13:33:37 INFO - PROCESS | 1608 | 1483652017662 Marionette TRACE conn5 <- [1,147,null,{"value":"13"}]
13:33:37 INFO - TEST-START | /XMLHttpRequest/event-upload-progress-crossorigin.sub.htm
13:33:37 INFO - PROCESS | 1608 | 1483652017667 Marionette TRACE conn5 -> [0,148,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:37 INFO - PROCESS | 1608 | 1483652017814 Marionette TRACE conn5 <- [1,148,null,{"value":null}]
13:33:37 INFO - PROCESS | 1608 | 1483652017823 Marionette TRACE conn5 -> [0,149,"getWindowHandles",null]
13:33:37 INFO - PROCESS | 1608 | 1483652017826 Marionette TRACE conn5 <- [1,149,null,["13"]]
13:33:37 INFO - PROCESS | 1608 | 1483652017829 Marionette TRACE conn5 -> [0,150,"switchToWindow",{"name":"13"}]
13:33:37 INFO - PROCESS | 1608 | 1483652017835 Marionette TRACE conn5 <- [1,150,null,{}]
13:33:37 INFO - PROCESS | 1608 | 1483652017870 Marionette TRACE conn5 -> [0,151,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:37 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C235C800 == 12 [pid = 1608] [id = 39]
13:33:37 INFO - PROCESS | 1608 | ++DOMWINDOW == 44 (000000E3C235D000) [pid = 1608] [serial = 114] [outer = 0000000000000000]
13:33:37 INFO - PROCESS | 1608 | ++DOMWINDOW == 45 (000000E3C2362800) [pid = 1608] [serial = 115] [outer = 000000E3C235D000]
13:33:37 INFO - PROCESS | 1608 | 1483652017932 Marionette DEBUG loaded listener.js
13:33:38 INFO - PROCESS | 1608 | ++DOMWINDOW == 46 (000000E3C2376800) [pid = 1608] [serial = 116] [outer = 000000E3C235D000]
13:33:38 INFO - PROCESS | 1608 | --DOMWINDOW == 45 (000000E3BD334800) [pid = 1608] [serial = 90] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-load.htm]
13:33:38 INFO - PROCESS | 1608 | --DOMWINDOW == 44 (000000E3C63C1000) [pid = 1608] [serial = 93] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-loadend.htm]
13:33:38 INFO - PROCESS | 1608 | --DOMWINDOW == 43 (000000E3CE744000) [pid = 1608] [serial = 87] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-error.sub.html]
13:33:38 INFO - PROCESS | 1608 | --DOMWINDOW == 42 (000000E3CBA8E800) [pid = 1608] [serial = 96] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-loadstart.htm]
13:33:38 INFO - PROCESS | 1608 | --DOMWINDOW == 41 (000000E3C0729000) [pid = 1608] [serial = 102] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-readystate-sync-open.htm]
13:33:38 INFO - PROCESS | 1608 | --DOMWINDOW == 40 (000000E3CEB13800) [pid = 1608] [serial = 99] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-progress.htm]
13:33:38 INFO - PROCESS | 1608 | 1483652018375 Marionette TRACE conn5 <- [1,151,null,{"value":["/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm",0,null,null,[["XMLHttpRequest: upload progress event for cross-origin requests",0,null,null]]]}]
13:33:38 INFO - .
13:33:38 INFO - TEST-OK | /XMLHttpRequest/event-upload-progress-crossorigin.sub.htm | took 733ms
13:33:38 INFO - PROCESS | 1608 | 1483652018404 Marionette TRACE conn5 -> [0,152,"getWindowHandle",null]
13:33:38 INFO - PROCESS | 1608 | 1483652018408 Marionette TRACE conn5 <- [1,152,null,{"value":"13"}]
13:33:38 INFO - TEST-START | /XMLHttpRequest/event-upload-progress.htm
13:33:38 INFO - PROCESS | 1608 | 1483652018412 Marionette TRACE conn5 -> [0,153,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:38 INFO - PROCESS | 1608 | 1483652018514 Marionette TRACE conn5 <- [1,153,null,{"value":null}]
13:33:38 INFO - PROCESS | 1608 | 1483652018519 Marionette TRACE conn5 -> [0,154,"getWindowHandles",null]
13:33:38 INFO - PROCESS | 1608 | 1483652018522 Marionette TRACE conn5 <- [1,154,null,["13"]]
13:33:38 INFO - PROCESS | 1608 | 1483652018525 Marionette TRACE conn5 -> [0,155,"switchToWindow",{"name":"13"}]
13:33:38 INFO - PROCESS | 1608 | 1483652018530 Marionette TRACE conn5 <- [1,155,null,{}]
13:33:38 INFO - PROCESS | 1608 | 1483652018582 Marionette TRACE conn5 -> [0,156,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/event-upload-progress.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/event-upload-progress.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:38 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C4F5F800 == 13 [pid = 1608] [id = 40]
13:33:38 INFO - PROCESS | 1608 | ++DOMWINDOW == 41 (000000E3C4F61000) [pid = 1608] [serial = 117] [outer = 0000000000000000]
13:33:38 INFO - PROCESS | 1608 | ++DOMWINDOW == 42 (000000E3C4F6F000) [pid = 1608] [serial = 118] [outer = 000000E3C4F61000]
13:33:38 INFO - PROCESS | 1608 | 1483652018641 Marionette DEBUG loaded listener.js
13:33:38 INFO - PROCESS | 1608 | ++DOMWINDOW == 43 (000000E3C5FAB000) [pid = 1608] [serial = 119] [outer = 000000E3C4F61000]
13:33:38 INFO - PROCESS | 1608 | 1483652018963 Marionette TRACE conn5 <- [1,156,null,{"value":["/XMLHttpRequest/event-upload-progress.htm",0,null,null,[["XMLHttpRequest: upload progress event",0,null,null]]]}]
13:33:39 INFO - .
13:33:39 INFO - TEST-OK | /XMLHttpRequest/event-upload-progress.htm | took 587ms
13:33:39 INFO - PROCESS | 1608 | 1483652019000 Marionette TRACE conn5 -> [0,157,"getWindowHandle",null]
13:33:39 INFO - PROCESS | 1608 | 1483652019002 Marionette TRACE conn5 <- [1,157,null,{"value":"13"}]
13:33:39 INFO - TEST-START | /XMLHttpRequest/formdata-blob.htm
13:33:39 INFO - PROCESS | 1608 | 1483652019007 Marionette TRACE conn5 -> [0,158,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:39 INFO - PROCESS | 1608 | 1483652019100 Marionette TRACE conn5 <- [1,158,null,{"value":null}]
13:33:39 INFO - PROCESS | 1608 | 1483652019153 Marionette TRACE conn5 -> [0,159,"getWindowHandles",null]
13:33:39 INFO - PROCESS | 1608 | 1483652019156 Marionette TRACE conn5 <- [1,159,null,["13"]]
13:33:39 INFO - PROCESS | 1608 | 1483652019160 Marionette TRACE conn5 -> [0,160,"switchToWindow",{"name":"13"}]
13:33:39 INFO - PROCESS | 1608 | 1483652019165 Marionette TRACE conn5 <- [1,160,null,{}]
13:33:39 INFO - PROCESS | 1608 | 1483652019169 Marionette TRACE conn5 -> [0,161,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-blob.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-blob.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:39 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C63B0800 == 14 [pid = 1608] [id = 41]
13:33:39 INFO - PROCESS | 1608 | ++DOMWINDOW == 44 (000000E3C63B6000) [pid = 1608] [serial = 120] [outer = 0000000000000000]
13:33:39 INFO - PROCESS | 1608 | ++DOMWINDOW == 45 (000000E3C716F800) [pid = 1608] [serial = 121] [outer = 000000E3C63B6000]
13:33:39 INFO - PROCESS | 1608 | 1483652019226 Marionette DEBUG loaded listener.js
13:33:39 INFO - PROCESS | 1608 | ++DOMWINDOW == 46 (000000E3C767A800) [pid = 1608] [serial = 122] [outer = 000000E3C63B6000]
13:33:39 INFO - PROCESS | 1608 | 1483652019545 Marionette TRACE conn5 <- [1,161,null,{"value":["/XMLHttpRequest/formdata-blob.htm",0,null,null,[["formdata with blob",0,null,null],["formdata with named blob",0,null,null],["formdata.append() should throw if value is string and file name is given",0,null,null]]]}]
13:33:39 INFO - ...
13:33:39 INFO - TEST-OK | /XMLHttpRequest/formdata-blob.htm | took 586ms
13:33:39 INFO - PROCESS | 1608 | 1483652019595 Marionette TRACE conn5 -> [0,162,"getWindowHandle",null]
13:33:39 INFO - PROCESS | 1608 | 1483652019597 Marionette TRACE conn5 <- [1,162,null,{"value":"13"}]
13:33:39 INFO - TEST-START | /XMLHttpRequest/formdata-delete.htm
13:33:39 INFO - PROCESS | 1608 | 1483652019603 Marionette TRACE conn5 -> [0,163,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:39 INFO - PROCESS | 1608 | 1483652019767 Marionette TRACE conn5 <- [1,163,null,{"value":null}]
13:33:39 INFO - PROCESS | 1608 | 1483652019773 Marionette TRACE conn5 -> [0,164,"getWindowHandles",null]
13:33:39 INFO - PROCESS | 1608 | 1483652019775 Marionette TRACE conn5 <- [1,164,null,["13"]]
13:33:39 INFO - PROCESS | 1608 | 1483652019778 Marionette TRACE conn5 -> [0,165,"switchToWindow",{"name":"13"}]
13:33:39 INFO - PROCESS | 1608 | 1483652019782 Marionette TRACE conn5 <- [1,165,null,{}]
13:33:39 INFO - PROCESS | 1608 | 1483652019787 Marionette TRACE conn5 -> [0,166,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-delete.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-delete.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:39 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C7D1A000 == 15 [pid = 1608] [id = 42]
13:33:39 INFO - PROCESS | 1608 | ++DOMWINDOW == 47 (000000E3C7D1D000) [pid = 1608] [serial = 123] [outer = 0000000000000000]
13:33:39 INFO - PROCESS | 1608 | ++DOMWINDOW == 48 (000000E3C7D22000) [pid = 1608] [serial = 124] [outer = 000000E3C7D1D000]
13:33:39 INFO - PROCESS | 1608 | 1483652019846 Marionette DEBUG loaded listener.js
13:33:39 INFO - PROCESS | 1608 | ++DOMWINDOW == 49 (000000E3C89C5000) [pid = 1608] [serial = 125] [outer = 000000E3C7D1D000]
13:33:40 INFO - PROCESS | 1608 | 1483652020200 Marionette TRACE conn5 <- [1,166,null,{"value":["/XMLHttpRequest/formdata-delete.htm",0,null,null,[["testFormDataDelete",0,null,null],["testFormDataDeleteFromForm",0,null,null],["testFormDataDeleteFromFormNonExistentKey",0,null,null],["testFormDataDeleteFromFormOtherKey",0,null,null],["testFormDataDeleteFromEmptyForm",0,null,null],["testFormDataDeleteNonExistentKey",0,null,null],["testFormDataDeleteOtherKey",0,null,null]]]}]
13:33:40 INFO - .......
13:33:40 INFO - TEST-OK | /XMLHttpRequest/formdata-delete.htm | took 628ms
13:33:40 INFO - TEST-START | /XMLHttpRequest/formdata-foreach.html
13:33:40 INFO - PROCESS | 1608 | 1483652020232 Marionette TRACE conn5 -> [0,167,"getWindowHandle",null]
13:33:40 INFO - PROCESS | 1608 | 1483652020235 Marionette TRACE conn5 <- [1,167,null,{"value":"13"}]
13:33:40 INFO - PROCESS | 1608 | 1483652020239 Marionette TRACE conn5 -> [0,168,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:40 INFO - PROCESS | 1608 | 1483652020350 Marionette TRACE conn5 <- [1,168,null,{"value":null}]
13:33:40 INFO - PROCESS | 1608 | 1483652020357 Marionette TRACE conn5 -> [0,169,"getWindowHandles",null]
13:33:40 INFO - PROCESS | 1608 | 1483652020360 Marionette TRACE conn5 <- [1,169,null,["13"]]
13:33:40 INFO - PROCESS | 1608 | 1483652020364 Marionette TRACE conn5 -> [0,170,"switchToWindow",{"name":"13"}]
13:33:40 INFO - PROCESS | 1608 | 1483652020368 Marionette TRACE conn5 <- [1,170,null,{}]
13:33:40 INFO - PROCESS | 1608 | 1483652020372 Marionette TRACE conn5 -> [0,171,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-foreach.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-foreach.html\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:40 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C8B84000 == 16 [pid = 1608] [id = 43]
13:33:40 INFO - PROCESS | 1608 | ++DOMWINDOW == 50 (000000E3C8B86800) [pid = 1608] [serial = 126] [outer = 0000000000000000]
13:33:40 INFO - PROCESS | 1608 | ++DOMWINDOW == 51 (000000E3C8B8E000) [pid = 1608] [serial = 127] [outer = 000000E3C8B86800]
13:33:40 INFO - PROCESS | 1608 | 1483652020427 Marionette DEBUG loaded listener.js
13:33:40 INFO - PROCESS | 1608 | ++DOMWINDOW == 52 (000000E3C8C2C800) [pid = 1608] [serial = 128] [outer = 000000E3C8B86800]
13:33:40 INFO - PROCESS | 1608 | 1483652020803 Marionette TRACE conn5 <- [1,171,null,{"value":["/XMLHttpRequest/formdata-foreach.html",0,null,null,[["Iterator should return duplicate keys and non-deleted values",0,null,null],["Entries iterator should return duplicate keys and non-deleted values",0,null,null],["Keys iterator should return duplicates",0,null,null],["Values iterator should return non-deleted values",0,null,null]]]}]
13:33:40 INFO - ....
13:33:40 INFO - TEST-OK | /XMLHttpRequest/formdata-foreach.html | took 630ms
13:33:40 INFO - PROCESS | 1608 | 1483652020884 Marionette TRACE conn5 -> [0,172,"getWindowHandle",null]
13:33:40 INFO - PROCESS | 1608 | 1483652020890 Marionette TRACE conn5 <- [1,172,null,{"value":"13"}]
13:33:40 INFO - TEST-START | /XMLHttpRequest/formdata-get.htm
13:33:40 INFO - PROCESS | 1608 | 1483652020899 Marionette TRACE conn5 -> [0,173,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:41 INFO - PROCESS | 1608 | 1483652021040 Marionette TRACE conn5 <- [1,173,null,{"value":null}]
13:33:41 INFO - PROCESS | 1608 | 1483652021108 Marionette TRACE conn5 -> [0,174,"getWindowHandles",null]
13:33:41 INFO - PROCESS | 1608 | 1483652021113 Marionette TRACE conn5 <- [1,174,null,["13"]]
13:33:41 INFO - PROCESS | 1608 | 1483652021118 Marionette TRACE conn5 -> [0,175,"switchToWindow",{"name":"13"}]
13:33:41 INFO - PROCESS | 1608 | 1483652021125 Marionette TRACE conn5 <- [1,175,null,{}]
13:33:41 INFO - PROCESS | 1608 | 1483652021130 Marionette TRACE conn5 -> [0,176,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-get.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-get.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:41 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3BD05A800 == 17 [pid = 1608] [id = 44]
13:33:41 INFO - PROCESS | 1608 | ++DOMWINDOW == 53 (000000E3BD305800) [pid = 1608] [serial = 129] [outer = 0000000000000000]
13:33:41 INFO - PROCESS | 1608 | ++DOMWINDOW == 54 (000000E3BD324000) [pid = 1608] [serial = 130] [outer = 000000E3BD305800]
13:33:41 INFO - PROCESS | 1608 | 1483652021208 Marionette DEBUG loaded listener.js
13:33:41 INFO - PROCESS | 1608 | ++DOMWINDOW == 55 (000000E3BD325000) [pid = 1608] [serial = 131] [outer = 000000E3BD305800]
13:33:41 INFO - PROCESS | 1608 | 1483652021668 Marionette TRACE conn5 <- [1,176,null,{"value":["/XMLHttpRequest/formdata-get.htm",0,null,null,[["testFormDataGet",0,null,null],["testFormDataGetFromForm",0,null,null],["testFormDataGetFromFormNull",0,null,null],["testFormDataGetFromEmptyForm",0,null,null],["testFormDataGetNull1",0,null,null],["testFormDataGetNull2",0,null,null],["testFormDataGetAll",0,null,null],["testFormDataGetAllEmpty1",0,null,null],["testFormDataGetAllEmpty2",0,null,null],["testFormDataGetAllFromForm",0,null,null],["testFormDataGetAllFromFormNull",0,null,null],["testFormDataGetAllFromEmptyForm",0,null,null]]]}]
13:33:41 INFO - ............
13:33:41 INFO - TEST-OK | /XMLHttpRequest/formdata-get.htm | took 840ms
13:33:41 INFO - PROCESS | 1608 | 1483652021773 Marionette TRACE conn5 -> [0,177,"getWindowHandle",null]
13:33:41 INFO - PROCESS | 1608 | 1483652021777 Marionette TRACE conn5 <- [1,177,null,{"value":"13"}]
13:33:41 INFO - TEST-START | /XMLHttpRequest/formdata-has.htm
13:33:41 INFO - PROCESS | 1608 | 1483652021787 Marionette TRACE conn5 -> [0,178,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:41 INFO - PROCESS | 1608 | 1483652021921 Marionette TRACE conn5 <- [1,178,null,{"value":null}]
13:33:41 INFO - PROCESS | 1608 | 1483652021990 Marionette TRACE conn5 -> [0,179,"getWindowHandles",null]
13:33:41 INFO - PROCESS | 1608 | 1483652021993 Marionette TRACE conn5 <- [1,179,null,["13"]]
13:33:42 INFO - PROCESS | 1608 | 1483652021998 Marionette TRACE conn5 -> [0,180,"switchToWindow",{"name":"13"}]
13:33:42 INFO - PROCESS | 1608 | 1483652022003 Marionette TRACE conn5 <- [1,180,null,{}]
13:33:42 INFO - PROCESS | 1608 | 1483652022007 Marionette TRACE conn5 -> [0,181,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-has.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-has.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:42 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C63BD000 == 18 [pid = 1608] [id = 45]
13:33:42 INFO - PROCESS | 1608 | ++DOMWINDOW == 56 (000000E3C63BF000) [pid = 1608] [serial = 132] [outer = 0000000000000000]
13:33:42 INFO - PROCESS | 1608 | ++DOMWINDOW == 57 (000000E3C77B1000) [pid = 1608] [serial = 133] [outer = 000000E3C63BF000]
13:33:42 INFO - PROCESS | 1608 | 1483652022079 Marionette DEBUG loaded listener.js
13:33:42 INFO - PROCESS | 1608 | ++DOMWINDOW == 58 (000000E3C89CA800) [pid = 1608] [serial = 134] [outer = 000000E3C63BF000]
13:33:42 INFO - PROCESS | 1608 | 1483652022513 Marionette TRACE conn5 <- [1,181,null,{"value":["/XMLHttpRequest/formdata-has.htm",0,null,null,[["testFormDataHas",0,null,null],["testFormDataHasFromForm",0,null,null],["testFormDataHasFromFormNull",0,null,null],["testFormDataHasFromEmptyForm",0,null,null],["testFormDataHasEmpty1",0,null,null],["testFormDataHasEmpty2",0,null,null]]]}]
13:33:42 INFO - ......
13:33:42 INFO - TEST-OK | /XMLHttpRequest/formdata-has.htm | took 776ms
13:33:42 INFO - PROCESS | 1608 | 1483652022567 Marionette TRACE conn5 -> [0,182,"getWindowHandle",null]
13:33:42 INFO - TEST-START | /XMLHttpRequest/formdata-set.htm
13:33:42 INFO - PROCESS | 1608 | 1483652022573 Marionette TRACE conn5 <- [1,182,null,{"value":"13"}]
13:33:42 INFO - PROCESS | 1608 | 1483652022579 Marionette TRACE conn5 -> [0,183,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:42 INFO - PROCESS | 1608 | 1483652022730 Marionette TRACE conn5 <- [1,183,null,{"value":null}]
13:33:42 INFO - PROCESS | 1608 | 1483652022789 Marionette TRACE conn5 -> [0,184,"getWindowHandles",null]
13:33:42 INFO - PROCESS | 1608 | 1483652022793 Marionette TRACE conn5 <- [1,184,null,["13"]]
13:33:42 INFO - PROCESS | 1608 | 1483652022796 Marionette TRACE conn5 -> [0,185,"switchToWindow",{"name":"13"}]
13:33:42 INFO - PROCESS | 1608 | 1483652022802 Marionette TRACE conn5 <- [1,185,null,{}]
13:33:42 INFO - PROCESS | 1608 | 1483652022806 Marionette TRACE conn5 -> [0,186,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata-set.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata-set.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:42 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C8FD5800 == 19 [pid = 1608] [id = 46]
13:33:42 INFO - PROCESS | 1608 | ++DOMWINDOW == 59 (000000E3C8FD6000) [pid = 1608] [serial = 135] [outer = 0000000000000000]
13:33:42 INFO - PROCESS | 1608 | ++DOMWINDOW == 60 (000000E3C9277800) [pid = 1608] [serial = 136] [outer = 000000E3C8FD6000]
13:33:42 INFO - PROCESS | 1608 | 1483652022921 Marionette DEBUG loaded listener.js
13:33:43 INFO - PROCESS | 1608 | ++DOMWINDOW == 61 (000000E3C928A800) [pid = 1608] [serial = 137] [outer = 000000E3C8FD6000]
13:33:43 INFO - PROCESS | 1608 | 1483652023391 Marionette TRACE conn5 <- [1,186,null,{"value":["/XMLHttpRequest/formdata-set.htm",0,null,null,[["Passing a String object to FormData.set should work",0,null,null],["testFormDataSet1",0,null,null],["testFormDataSet2",0,null,null],["testFormDataSetUndefined1",0,null,null],["testFormDataSetUndefined2",0,null,null],["testFormDataSetNull1",0,null,null],["testFormDataSetNull2",0,null,null],["testFormDataSetToForm1",0,null,null],["testFormDataSetToForm2",0,null,null],["testFormDataSetToFormUndefined1",0,null,null],["testFormDataSetToFormUndefined2",0,null,null],["testFormDataSetToFormNull1",0,null,null],["testFormDataSetToFormNull2",0,null,null],["testFormDataSetEmptyBlob",0,null,null]]]}]
13:33:43 INFO - ..............
13:33:43 INFO - TEST-OK | /XMLHttpRequest/formdata-set.htm | took 883ms
13:33:43 INFO - TEST-START | /XMLHttpRequest/formdata.htm
13:33:43 INFO - PROCESS | 1608 | 1483652023461 Marionette TRACE conn5 -> [0,187,"getWindowHandle",null]
13:33:43 INFO - PROCESS | 1608 | 1483652023465 Marionette TRACE conn5 <- [1,187,null,{"value":"13"}]
13:33:43 INFO - PROCESS | 1608 | 1483652023471 Marionette TRACE conn5 -> [0,188,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:43 INFO - PROCESS | 1608 | 1483652023597 Marionette TRACE conn5 <- [1,188,null,{"value":null}]
13:33:43 INFO - PROCESS | 1608 | 1483652023667 Marionette TRACE conn5 -> [0,189,"getWindowHandles",null]
13:33:43 INFO - PROCESS | 1608 | 1483652023671 Marionette TRACE conn5 <- [1,189,null,["13"]]
13:33:43 INFO - PROCESS | 1608 | 1483652023674 Marionette TRACE conn5 -> [0,190,"switchToWindow",{"name":"13"}]
13:33:43 INFO - PROCESS | 1608 | 1483652023679 Marionette TRACE conn5 <- [1,190,null,{}]
13:33:43 INFO - PROCESS | 1608 | 1483652023683 Marionette TRACE conn5 -> [0,191,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/formdata.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/formdata.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:43 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C9C21800 == 20 [pid = 1608] [id = 47]
13:33:43 INFO - PROCESS | 1608 | ++DOMWINDOW == 62 (000000E3C9C26800) [pid = 1608] [serial = 138] [outer = 0000000000000000]
13:33:43 INFO - PROCESS | 1608 | ++DOMWINDOW == 63 (000000E3C9EF3800) [pid = 1608] [serial = 139] [outer = 000000E3C9C26800]
13:33:43 INFO - PROCESS | 1608 | 1483652023762 Marionette DEBUG loaded listener.js
13:33:43 INFO - PROCESS | 1608 | ++DOMWINDOW == 64 (000000E3CB276800) [pid = 1608] [serial = 140] [outer = 000000E3C9C26800]
13:33:44 INFO - PROCESS | 1608 | 1483652024239 Marionette TRACE conn5 <- [1,191,null,{"value":["/XMLHttpRequest/formdata.htm",0,null,null,[["empty formdata",0,null,null],["formdata with string",0,null,null],["formdata with named string",0,null,null],["formdata from form",0,null,null]]]}]
13:33:44 INFO - ....
13:33:44 INFO - TEST-OK | /XMLHttpRequest/formdata.htm | took 839ms
13:33:44 INFO - PROCESS | 1608 | 1483652024309 Marionette TRACE conn5 -> [0,192,"getWindowHandle",null]
13:33:44 INFO - PROCESS | 1608 | 1483652024312 Marionette TRACE conn5 <- [1,192,null,{"value":"13"}]
13:33:44 INFO - TEST-START | /XMLHttpRequest/getallresponseheaders-cookies.htm
13:33:44 INFO - PROCESS | 1608 | 1483652024317 Marionette TRACE conn5 -> [0,193,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:44 INFO - PROCESS | 1608 | 1483652024461 Marionette TRACE conn5 <- [1,193,null,{"value":null}]
13:33:44 INFO - PROCESS | 1608 | 1483652024576 Marionette TRACE conn5 -> [0,194,"getWindowHandles",null]
13:33:44 INFO - PROCESS | 1608 | 1483652024579 Marionette TRACE conn5 <- [1,194,null,["13"]]
13:33:44 INFO - PROCESS | 1608 | 1483652024583 Marionette TRACE conn5 -> [0,195,"switchToWindow",{"name":"13"}]
13:33:44 INFO - PROCESS | 1608 | 1483652024587 Marionette TRACE conn5 <- [1,195,null,{}]
13:33:44 INFO - PROCESS | 1608 | 1483652024591 Marionette TRACE conn5 -> [0,196,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getallresponseheaders-cookies.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-cookies.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:44 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C8B79000 == 21 [pid = 1608] [id = 48]
13:33:44 INFO - PROCESS | 1608 | ++DOMWINDOW == 65 (000000E3C8B8A000) [pid = 1608] [serial = 141] [outer = 0000000000000000]
13:33:44 INFO - PROCESS | 1608 | ++DOMWINDOW == 66 (000000E3CB999000) [pid = 1608] [serial = 142] [outer = 000000E3C8B8A000]
13:33:44 INFO - PROCESS | 1608 | 1483652024659 Marionette DEBUG loaded listener.js
13:33:44 INFO - PROCESS | 1608 | ++DOMWINDOW == 67 (000000E3CBA86000) [pid = 1608] [serial = 143] [outer = 000000E3C8B8A000]
13:33:45 INFO - PROCESS | 1608 | [1608] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
13:33:45 INFO - PROCESS | 1608 | [1608] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
13:33:45 INFO - PROCESS | 1608 | [1608] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
13:33:45 INFO - PROCESS | 1608 | [1608] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
13:33:45 INFO - PROCESS | 1608 | [1608] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
13:33:45 INFO - PROCESS | 1608 | [1608] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
13:33:45 INFO - PROCESS | 1608 | 1483652025147 Marionette TRACE conn5 <- [1,196,null,{"value":["/XMLHttpRequest/getallresponseheaders-cookies.htm",0,null,null,[["XMLHttpRequest: getAllResponseHeaders() excludes cookies",0,null,null]]]}]
13:33:45 INFO - .
13:33:45 INFO - TEST-OK | /XMLHttpRequest/getallresponseheaders-cookies.htm | took 881ms
13:33:45 INFO - PROCESS | 1608 | 1483652025200 Marionette TRACE conn5 -> [0,197,"getWindowHandle",null]
13:33:45 INFO - PROCESS | 1608 | 1483652025205 Marionette TRACE conn5 <- [1,197,null,{"value":"13"}]
13:33:45 INFO - TEST-START | /XMLHttpRequest/getallresponseheaders-status.htm
13:33:45 INFO - PROCESS | 1608 | 1483652025213 Marionette TRACE conn5 -> [0,198,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:45 INFO - PROCESS | 1608 | 1483652025368 Marionette TRACE conn5 <- [1,198,null,{"value":null}]
13:33:45 INFO - PROCESS | 1608 | 1483652025427 Marionette TRACE conn5 -> [0,199,"getWindowHandles",null]
13:33:45 INFO - PROCESS | 1608 | 1483652025432 Marionette TRACE conn5 <- [1,199,null,["13"]]
13:33:45 INFO - PROCESS | 1608 | 1483652025437 Marionette TRACE conn5 -> [0,200,"switchToWindow",{"name":"13"}]
13:33:45 INFO - PROCESS | 1608 | 1483652025442 Marionette TRACE conn5 <- [1,200,null,{}]
13:33:45 INFO - PROCESS | 1608 | 1483652025492 Marionette TRACE conn5 -> [0,201,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getallresponseheaders-status.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-status.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:45 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3BD043800 == 22 [pid = 1608] [id = 49]
13:33:45 INFO - PROCESS | 1608 | ++DOMWINDOW == 68 (000000E3BD059800) [pid = 1608] [serial = 144] [outer = 0000000000000000]
13:33:45 INFO - PROCESS | 1608 | ++DOMWINDOW == 69 (000000E3C0C44000) [pid = 1608] [serial = 145] [outer = 000000E3BD059800]
13:33:45 INFO - PROCESS | 1608 | 1483652025558 Marionette DEBUG loaded listener.js
13:33:45 INFO - PROCESS | 1608 | ++DOMWINDOW == 70 (000000E3C216A800) [pid = 1608] [serial = 146] [outer = 000000E3BD059800]
13:33:45 INFO - PROCESS | 1608 | --DOCSHELL 000000E3C4F6A000 == 21 [pid = 1608] [id = 36]
13:33:45 INFO - PROCESS | 1608 | --DOMWINDOW == 69 (000000E3CEB1B000) [pid = 1608] [serial = 89] [outer = 0000000000000000] [url = about:blank]
13:33:45 INFO - PROCESS | 1608 | --DOMWINDOW == 68 (000000E3C09A4000) [pid = 1608] [serial = 103] [outer = 0000000000000000] [url = about:blank]
13:33:45 INFO - PROCESS | 1608 | --DOMWINDOW == 67 (000000E3C1524000) [pid = 1608] [serial = 104] [outer = 0000000000000000] [url = about:blank]
13:33:45 INFO - PROCESS | 1608 | --DOMWINDOW == 66 (000000E3CEB18000) [pid = 1608] [serial = 100] [outer = 0000000000000000] [url = about:blank]
13:33:45 INFO - PROCESS | 1608 | --DOMWINDOW == 65 (000000E3CEB21000) [pid = 1608] [serial = 101] [outer = 0000000000000000] [url = about:blank]
13:33:45 INFO - PROCESS | 1608 | --DOMWINDOW == 64 (000000E3CCE98000) [pid = 1608] [serial = 97] [outer = 0000000000000000] [url = about:blank]
13:33:45 INFO - PROCESS | 1608 | --DOMWINDOW == 63 (000000E3CDFF1000) [pid = 1608] [serial = 98] [outer = 0000000000000000] [url = about:blank]
13:33:45 INFO - PROCESS | 1608 | --DOMWINDOW == 62 (000000E3C7160800) [pid = 1608] [serial = 94] [outer = 0000000000000000] [url = about:blank]
13:33:45 INFO - PROCESS | 1608 | --DOMWINDOW == 61 (000000E3C77C1800) [pid = 1608] [serial = 95] [outer = 0000000000000000] [url = about:blank]
13:33:45 INFO - PROCESS | 1608 | --DOMWINDOW == 60 (000000E3BD3E4800) [pid = 1608] [serial = 91] [outer = 0000000000000000] [url = about:blank]
13:33:45 INFO - PROCESS | 1608 | --DOMWINDOW == 59 (000000E3C07DC000) [pid = 1608] [serial = 92] [outer = 0000000000000000] [url = about:blank]
13:33:45 INFO - PROCESS | 1608 | --DOMWINDOW == 58 (000000E3C5F91800) [pid = 1608] [serial = 106] [outer = 0000000000000000] [url = about:blank]
13:33:45 INFO - PROCESS | 1608 | [1608] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
13:33:45 INFO - PROCESS | 1608 | [1608] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
13:33:45 INFO - PROCESS | 1608 | [1608] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
13:33:45 INFO - PROCESS | 1608 | [1608] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
13:33:45 INFO - PROCESS | 1608 | [1608] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
13:33:45 INFO - PROCESS | 1608 | [1608] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
13:33:45 INFO - PROCESS | 1608 | 1483652025902 Marionette TRACE conn5 <- [1,201,null,{"value":["/XMLHttpRequest/getallresponseheaders-status.htm",0,null,null,[["XMLHttpRequest: getAllResponseHeaders() excludes status",0,null,null]]]}]
13:33:45 INFO - .
13:33:45 INFO - TEST-OK | /XMLHttpRequest/getallresponseheaders-status.htm | took 733ms
13:33:45 INFO - PROCESS | 1608 | 1483652025946 Marionette TRACE conn5 -> [0,202,"getWindowHandle",null]
13:33:45 INFO - PROCESS | 1608 | 1483652025950 Marionette TRACE conn5 <- [1,202,null,{"value":"13"}]
13:33:45 INFO - TEST-START | /XMLHttpRequest/getresponseheader-case-insensitive.htm
13:33:45 INFO - PROCESS | 1608 | 1483652025955 Marionette TRACE conn5 -> [0,203,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:46 INFO - PROCESS | 1608 | 1483652026069 Marionette TRACE conn5 <- [1,203,null,{"value":null}]
13:33:46 INFO - PROCESS | 1608 | 1483652026128 Marionette TRACE conn5 -> [0,204,"getWindowHandles",null]
13:33:46 INFO - PROCESS | 1608 | 1483652026131 Marionette TRACE conn5 <- [1,204,null,["13"]]
13:33:46 INFO - PROCESS | 1608 | 1483652026135 Marionette TRACE conn5 -> [0,205,"switchToWindow",{"name":"13"}]
13:33:46 INFO - PROCESS | 1608 | 1483652026139 Marionette TRACE conn5 <- [1,205,null,{}]
13:33:46 INFO - PROCESS | 1608 | 1483652026142 Marionette TRACE conn5 -> [0,206,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-case-insensitive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-case-insensitive.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:46 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C1462800 == 22 [pid = 1608] [id = 50]
13:33:46 INFO - PROCESS | 1608 | ++DOMWINDOW == 59 (000000E3C1511000) [pid = 1608] [serial = 147] [outer = 0000000000000000]
13:33:46 INFO - PROCESS | 1608 | ++DOMWINDOW == 60 (000000E3C2152800) [pid = 1608] [serial = 148] [outer = 000000E3C1511000]
13:33:46 INFO - PROCESS | 1608 | 1483652026203 Marionette DEBUG loaded listener.js
13:33:46 INFO - PROCESS | 1608 | ++DOMWINDOW == 61 (000000E3C2927800) [pid = 1608] [serial = 149] [outer = 000000E3C1511000]
13:33:46 INFO - PROCESS | 1608 | 1483652026539 Marionette TRACE conn5 <- [1,206,null,{"value":["/XMLHttpRequest/getresponseheader-case-insensitive.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() case-insensitive matching",0,null,null]]]}]
13:33:46 INFO - .
13:33:46 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-case-insensitive.htm | took 629ms
13:33:46 INFO - PROCESS | 1608 | 1483652026591 Marionette TRACE conn5 -> [0,207,"getWindowHandle",null]
13:33:46 INFO - PROCESS | 1608 | 1483652026596 Marionette TRACE conn5 <- [1,207,null,{"value":"13"}]
13:33:46 INFO - PROCESS | 1608 | 1483652026601 Marionette TRACE conn5 -> [0,208,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:46 INFO - TEST-START | /XMLHttpRequest/getresponseheader-chunked-trailer.htm
13:33:46 INFO - PROCESS | 1608 | 1483652026700 Marionette TRACE conn5 <- [1,208,null,{"value":null}]
13:33:46 INFO - PROCESS | 1608 | 1483652026708 Marionette TRACE conn5 -> [0,209,"getWindowHandles",null]
13:33:46 INFO - PROCESS | 1608 | 1483652026711 Marionette TRACE conn5 <- [1,209,null,["13"]]
13:33:46 INFO - PROCESS | 1608 | 1483652026714 Marionette TRACE conn5 -> [0,210,"switchToWindow",{"name":"13"}]
13:33:46 INFO - PROCESS | 1608 | 1483652026720 Marionette TRACE conn5 <- [1,210,null,{}]
13:33:46 INFO - PROCESS | 1608 | 1483652026724 Marionette TRACE conn5 -> [0,211,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-chunked-trailer.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-chunked-trailer.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:46 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C7740800 == 23 [pid = 1608] [id = 51]
13:33:46 INFO - PROCESS | 1608 | ++DOMWINDOW == 62 (000000E3C77B6000) [pid = 1608] [serial = 150] [outer = 0000000000000000]
13:33:46 INFO - PROCESS | 1608 | ++DOMWINDOW == 63 (000000E3C7D0E800) [pid = 1608] [serial = 151] [outer = 000000E3C77B6000]
13:33:46 INFO - PROCESS | 1608 | 1483652026785 Marionette DEBUG loaded listener.js
13:33:46 INFO - PROCESS | 1608 | ++DOMWINDOW == 64 (000000E3C89C8800) [pid = 1608] [serial = 152] [outer = 000000E3C77B6000]
13:33:47 INFO - PROCESS | 1608 | 1483652027137 Marionette TRACE conn5 <- [1,211,null,{"value":["/XMLHttpRequest/getresponseheader-chunked-trailer.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() and HTTP trailer",0,null,null]]]}]
13:33:47 INFO - .
13:33:47 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-chunked-trailer.htm | took 586ms
13:33:47 INFO - TEST-START | /XMLHttpRequest/getresponseheader-cookies-and-more.htm
13:33:47 INFO - PROCESS | 1608 | 1483652027190 Marionette TRACE conn5 -> [0,212,"getWindowHandle",null]
13:33:47 INFO - PROCESS | 1608 | 1483652027194 Marionette TRACE conn5 <- [1,212,null,{"value":"13"}]
13:33:47 INFO - PROCESS | 1608 | 1483652027199 Marionette TRACE conn5 -> [0,213,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:47 INFO - PROCESS | 1608 | 1483652027298 Marionette TRACE conn5 <- [1,213,null,{"value":null}]
13:33:47 INFO - PROCESS | 1608 | 1483652027304 Marionette TRACE conn5 -> [0,214,"getWindowHandles",null]
13:33:47 INFO - PROCESS | 1608 | 1483652027306 Marionette TRACE conn5 <- [1,214,null,["13"]]
13:33:47 INFO - PROCESS | 1608 | 1483652027310 Marionette TRACE conn5 -> [0,215,"switchToWindow",{"name":"13"}]
13:33:47 INFO - PROCESS | 1608 | 1483652027313 Marionette TRACE conn5 <- [1,215,null,{}]
13:33:47 INFO - PROCESS | 1608 | 1483652027318 Marionette TRACE conn5 -> [0,216,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-cookies-and-more.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-cookies-and-more.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:47 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C8FCE000 == 24 [pid = 1608] [id = 52]
13:33:47 INFO - PROCESS | 1608 | ++DOMWINDOW == 65 (000000E3C8FD2000) [pid = 1608] [serial = 153] [outer = 0000000000000000]
13:33:47 INFO - PROCESS | 1608 | ++DOMWINDOW == 66 (000000E3C927E800) [pid = 1608] [serial = 154] [outer = 000000E3C8FD2000]
13:33:47 INFO - PROCESS | 1608 | 1483652027375 Marionette DEBUG loaded listener.js
13:33:47 INFO - PROCESS | 1608 | ++DOMWINDOW == 67 (000000E3C95CA000) [pid = 1608] [serial = 155] [outer = 000000E3C8FD2000]
13:33:47 INFO - PROCESS | 1608 | [1608] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
13:33:47 INFO - PROCESS | 1608 | [1608] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
13:33:47 INFO - PROCESS | 1608 | [1608] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
13:33:47 INFO - PROCESS | 1608 | [1608] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
13:33:47 INFO - PROCESS | 1608 | [1608] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
13:33:47 INFO - PROCESS | 1608 | [1608] WARNING: blocked access to response header: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1088
13:33:47 INFO - PROCESS | 1608 | 1483652027744 Marionette TRACE conn5 <- [1,216,null,{"value":["/XMLHttpRequest/getresponseheader-cookies-and-more.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() custom/non-existent headers and cookies",0,null,null]]]}]
13:33:47 INFO - .
13:33:47 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-cookies-and-more.htm | took 586ms
13:33:47 INFO - PROCESS | 1608 | 1483652027785 Marionette TRACE conn5 -> [0,217,"getWindowHandle",null]
13:33:47 INFO - PROCESS | 1608 | 1483652027787 Marionette TRACE conn5 <- [1,217,null,{"value":"13"}]
13:33:47 INFO - TEST-START | /XMLHttpRequest/getresponseheader-error-state.htm
13:33:47 INFO - PROCESS | 1608 | 1483652027791 Marionette TRACE conn5 -> [0,218,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:47 INFO - PROCESS | 1608 | 1483652027883 Marionette TRACE conn5 <- [1,218,null,{"value":null}]
13:33:47 INFO - PROCESS | 1608 | 1483652027888 Marionette TRACE conn5 -> [0,219,"getWindowHandles",null]
13:33:47 INFO - PROCESS | 1608 | 1483652027891 Marionette TRACE conn5 <- [1,219,null,["13"]]
13:33:47 INFO - PROCESS | 1608 | 1483652027894 Marionette TRACE conn5 -> [0,220,"switchToWindow",{"name":"13"}]
13:33:47 INFO - PROCESS | 1608 | 1483652027899 Marionette TRACE conn5 <- [1,220,null,{}]
13:33:47 INFO - PROCESS | 1608 | 1483652027903 Marionette TRACE conn5 -> [0,221,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-error-state.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-error-state.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:47 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CBA8C000 == 25 [pid = 1608] [id = 53]
13:33:47 INFO - PROCESS | 1608 | ++DOMWINDOW == 68 (000000E3CBA8D800) [pid = 1608] [serial = 156] [outer = 0000000000000000]
13:33:47 INFO - PROCESS | 1608 | ++DOMWINDOW == 69 (000000E3CCE88000) [pid = 1608] [serial = 157] [outer = 000000E3CBA8D800]
13:33:47 INFO - PROCESS | 1608 | 1483652027959 Marionette DEBUG loaded listener.js
13:33:48 INFO - PROCESS | 1608 | ++DOMWINDOW == 70 (000000E3CCE8E000) [pid = 1608] [serial = 158] [outer = 000000E3CBA8D800]
13:33:48 INFO - PROCESS | 1608 | 1483652028354 Marionette TRACE conn5 <- [1,221,null,{"value":["/XMLHttpRequest/getresponseheader-error-state.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() in error state (failing cross-origin test)",0,null,null]]]}]
13:33:48 INFO - .
13:33:48 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-error-state.htm | took 586ms
13:33:48 INFO - PROCESS | 1608 | 1483652028380 Marionette TRACE conn5 -> [0,222,"getWindowHandle",null]
13:33:48 INFO - PROCESS | 1608 | 1483652028382 Marionette TRACE conn5 <- [1,222,null,{"value":"13"}]
13:33:48 INFO - TEST-START | /XMLHttpRequest/getresponseheader-server-date.htm
13:33:48 INFO - PROCESS | 1608 | 1483652028387 Marionette TRACE conn5 -> [0,223,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:48 INFO - PROCESS | 1608 | 1483652028533 Marionette TRACE conn5 <- [1,223,null,{"value":null}]
13:33:48 INFO - PROCESS | 1608 | 1483652028539 Marionette TRACE conn5 -> [0,224,"getWindowHandles",null]
13:33:48 INFO - PROCESS | 1608 | 1483652028542 Marionette TRACE conn5 <- [1,224,null,["13"]]
13:33:48 INFO - PROCESS | 1608 | 1483652028579 Marionette TRACE conn5 -> [0,225,"switchToWindow",{"name":"13"}]
13:33:48 INFO - PROCESS | 1608 | 1483652028583 Marionette TRACE conn5 <- [1,225,null,{}]
13:33:48 INFO - PROCESS | 1608 | 1483652028586 Marionette TRACE conn5 -> [0,226,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-server-date.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-server-date.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:48 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3BC106000 == 26 [pid = 1608] [id = 54]
13:33:48 INFO - PROCESS | 1608 | ++DOMWINDOW == 71 (000000E3CD519800) [pid = 1608] [serial = 159] [outer = 0000000000000000]
13:33:48 INFO - PROCESS | 1608 | ++DOMWINDOW == 72 (000000E3CD598800) [pid = 1608] [serial = 160] [outer = 000000E3CD519800]
13:33:48 INFO - PROCESS | 1608 | 1483652028645 Marionette DEBUG loaded listener.js
13:33:48 INFO - PROCESS | 1608 | ++DOMWINDOW == 73 (000000E3CD5A5000) [pid = 1608] [serial = 161] [outer = 000000E3CD519800]
13:33:49 INFO - PROCESS | 1608 | 1483652029008 Marionette TRACE conn5 <- [1,226,null,{"value":["/XMLHttpRequest/getresponseheader-server-date.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() server and date",0,null,null]]]}]
13:33:49 INFO - .
13:33:49 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-server-date.htm | took 670ms
13:33:49 INFO - PROCESS | 1608 | 1483652029059 Marionette TRACE conn5 -> [0,227,"getWindowHandle",null]
13:33:49 INFO - PROCESS | 1608 | 1483652029061 Marionette TRACE conn5 <- [1,227,null,{"value":"13"}]
13:33:49 INFO - TEST-START | /XMLHttpRequest/getresponseheader-special-characters.htm
13:33:49 INFO - PROCESS | 1608 | 1483652029066 Marionette TRACE conn5 -> [0,228,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:49 INFO - PROCESS | 1608 | 1483652029185 Marionette TRACE conn5 <- [1,228,null,{"value":null}]
13:33:49 INFO - PROCESS | 1608 | 1483652029190 Marionette TRACE conn5 -> [0,229,"getWindowHandles",null]
13:33:49 INFO - PROCESS | 1608 | 1483652029193 Marionette TRACE conn5 <- [1,229,null,["13"]]
13:33:49 INFO - PROCESS | 1608 | 1483652029196 Marionette TRACE conn5 -> [0,230,"switchToWindow",{"name":"13"}]
13:33:49 INFO - PROCESS | 1608 | 1483652029200 Marionette TRACE conn5 <- [1,230,null,{}]
13:33:49 INFO - PROCESS | 1608 | 1483652029239 Marionette TRACE conn5 -> [0,231,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-special-characters.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-special-characters.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:49 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CDFF5800 == 27 [pid = 1608] [id = 55]
13:33:49 INFO - PROCESS | 1608 | ++DOMWINDOW == 74 (000000E3CDFF6000) [pid = 1608] [serial = 162] [outer = 0000000000000000]
13:33:49 INFO - PROCESS | 1608 | ++DOMWINDOW == 75 (000000E3CDFFA800) [pid = 1608] [serial = 163] [outer = 000000E3CDFF6000]
13:33:49 INFO - PROCESS | 1608 | 1483652029293 Marionette DEBUG loaded listener.js
13:33:49 INFO - PROCESS | 1608 | ++DOMWINDOW == 76 (000000E3CE199800) [pid = 1608] [serial = 164] [outer = 000000E3CDFF6000]
13:33:49 INFO - PROCESS | 1608 | --DOMWINDOW == 75 (000000E3C0747800) [pid = 1608] [serial = 111] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-timeout.htm]
13:33:49 INFO - PROCESS | 1608 | --DOMWINDOW == 74 (000000E3C63B6000) [pid = 1608] [serial = 120] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-blob.htm]
13:33:49 INFO - PROCESS | 1608 | --DOMWINDOW == 73 (000000E3C7D1D000) [pid = 1608] [serial = 123] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/formdata-delete.htm]
13:33:49 INFO - PROCESS | 1608 | --DOMWINDOW == 72 (000000E3C4F61000) [pid = 1608] [serial = 117] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-upload-progress.htm]
13:33:49 INFO - PROCESS | 1608 | --DOMWINDOW == 71 (000000E3C235D000) [pid = 1608] [serial = 114] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-upload-progress-crossorigin.sub.htm]
13:33:49 INFO - PROCESS | 1608 | --DOMWINDOW == 70 (000000E3BC407800) [pid = 1608] [serial = 108] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/event-timeout-order.htm]
13:33:49 INFO - PROCESS | 1608 | 1483652029666 Marionette TRACE conn5 <- [1,231,null,{"value":["/XMLHttpRequest/getresponseheader-special-characters.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() funny characters",0,null,null]]]}]
13:33:49 INFO - .
13:33:49 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-special-characters.htm | took 628ms
13:33:49 INFO - PROCESS | 1608 | 1483652029697 Marionette TRACE conn5 -> [0,232,"getWindowHandle",null]
13:33:49 INFO - PROCESS | 1608 | 1483652029699 Marionette TRACE conn5 <- [1,232,null,{"value":"13"}]
13:33:49 INFO - TEST-START | /XMLHttpRequest/getresponseheader-unsent-opened-state.htm
13:33:49 INFO - PROCESS | 1608 | 1483652029704 Marionette TRACE conn5 -> [0,233,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:49 INFO - PROCESS | 1608 | 1483652029796 Marionette TRACE conn5 <- [1,233,null,{"value":null}]
13:33:49 INFO - PROCESS | 1608 | 1483652029802 Marionette TRACE conn5 -> [0,234,"getWindowHandles",null]
13:33:49 INFO - PROCESS | 1608 | 1483652029804 Marionette TRACE conn5 <- [1,234,null,["13"]]
13:33:49 INFO - PROCESS | 1608 | 1483652029807 Marionette TRACE conn5 -> [0,235,"switchToWindow",{"name":"13"}]
13:33:49 INFO - PROCESS | 1608 | 1483652029811 Marionette TRACE conn5 <- [1,235,null,{}]
13:33:49 INFO - PROCESS | 1608 | 1483652029814 Marionette TRACE conn5 -> [0,236,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/getresponseheader-unsent-opened-state.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/getresponseheader-unsent-opened-state.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:49 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CE1AB000 == 28 [pid = 1608] [id = 56]
13:33:49 INFO - PROCESS | 1608 | ++DOMWINDOW == 71 (000000E3CE1AB800) [pid = 1608] [serial = 165] [outer = 0000000000000000]
13:33:49 INFO - PROCESS | 1608 | ++DOMWINDOW == 72 (000000E3CE305800) [pid = 1608] [serial = 166] [outer = 000000E3CE1AB800]
13:33:49 INFO - PROCESS | 1608 | 1483652029871 Marionette DEBUG loaded listener.js
13:33:49 INFO - PROCESS | 1608 | ++DOMWINDOW == 73 (000000E3CE30E800) [pid = 1608] [serial = 167] [outer = 000000E3CE1AB800]
13:33:50 INFO - PROCESS | 1608 | 1483652030221 Marionette TRACE conn5 <- [1,236,null,{"value":["/XMLHttpRequest/getresponseheader-unsent-opened-state.htm",0,null,null,[["XMLHttpRequest: getResponseHeader() in unsent, opened states",0,null,null]]]}]
13:33:50 INFO - .
13:33:50 INFO - TEST-OK | /XMLHttpRequest/getresponseheader-unsent-opened-state.htm | took 587ms
13:33:50 INFO - PROCESS | 1608 | 1483652030292 Marionette TRACE conn5 -> [0,237,"getWindowHandle",null]
13:33:50 INFO - PROCESS | 1608 | 1483652030294 Marionette TRACE conn5 <- [1,237,null,{"value":"13"}]
13:33:50 INFO - TEST-START | /XMLHttpRequest/headers-normalize-response.htm
13:33:50 INFO - PROCESS | 1608 | 1483652030301 Marionette TRACE conn5 -> [0,238,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:50 INFO - PROCESS | 1608 | 1483652030415 Marionette TRACE conn5 <- [1,238,null,{"value":null}]
13:33:50 INFO - PROCESS | 1608 | 1483652030421 Marionette TRACE conn5 -> [0,239,"getWindowHandles",null]
13:33:50 INFO - PROCESS | 1608 | 1483652030424 Marionette TRACE conn5 <- [1,239,null,["13"]]
13:33:50 INFO - PROCESS | 1608 | 1483652030426 Marionette TRACE conn5 -> [0,240,"switchToWindow",{"name":"13"}]
13:33:50 INFO - PROCESS | 1608 | 1483652030430 Marionette TRACE conn5 <- [1,240,null,{}]
13:33:50 INFO - PROCESS | 1608 | 1483652030434 Marionette TRACE conn5 -> [0,241,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/headers-normalize-response.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/headers-normalize-response.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:50 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CE322800 == 29 [pid = 1608] [id = 57]
13:33:50 INFO - PROCESS | 1608 | ++DOMWINDOW == 74 (000000E3CE734800) [pid = 1608] [serial = 168] [outer = 0000000000000000]
13:33:50 INFO - PROCESS | 1608 | ++DOMWINDOW == 75 (000000E3CE73A000) [pid = 1608] [serial = 169] [outer = 000000E3CE734800]
13:33:50 INFO - PROCESS | 1608 | 1483652030489 Marionette DEBUG loaded listener.js
13:33:50 INFO - PROCESS | 1608 | ++DOMWINDOW == 76 (000000E3CE317800) [pid = 1608] [serial = 170] [outer = 000000E3CE734800]
13:33:50 INFO - PROCESS | 1608 | 1483652030901 Marionette TRACE conn5 <- [1,241,null,{"value":["/XMLHttpRequest/headers-normalize-response.htm",0,null,null,[["Header value: hello_world\\0",0,null,null],["Header value: \\0hello_world",0,null,null],["Header value: hello\\0world",0,null,null],["Header value: __hello_world",0,null,null],["Header value: hello_world__",0,null,null],["Header value: __hello_world__",0,null,null],["Header value: [tab]hello_world",0,null,null],["Header value: hello_world[tab]",0,null,null],["Header value: [tab]hello_world[tab]",0,null,null],["Header value: hello______world",0,null,null],["Header value: hello[tab]world",0,null,null],["Header value: \\0",0,null,null],["Header value: ___",0,null,null],["Header value: [tab]",0,null,null],["Header value: ",0,null,null]]]}]
13:33:50 INFO - ...............
13:33:50 INFO - TEST-OK | /XMLHttpRequest/headers-normalize-response.htm | took 630ms
13:33:50 INFO - TEST-START | /XMLHttpRequest/interfaces.html
13:33:50 INFO - PROCESS | 1608 | 1483652030936 Marionette TRACE conn5 -> [0,242,"getWindowHandle",null]
13:33:50 INFO - PROCESS | 1608 | 1483652030939 Marionette TRACE conn5 <- [1,242,null,{"value":"13"}]
13:33:50 INFO - PROCESS | 1608 | 1483652030943 Marionette TRACE conn5 -> [0,243,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:51 INFO - PROCESS | 1608 | 1483652031061 Marionette TRACE conn5 <- [1,243,null,{"value":null}]
13:33:51 INFO - PROCESS | 1608 | 1483652031072 Marionette TRACE conn5 -> [0,244,"getWindowHandles",null]
13:33:51 INFO - PROCESS | 1608 | 1483652031075 Marionette TRACE conn5 <- [1,244,null,["13"]]
13:33:51 INFO - PROCESS | 1608 | 1483652031078 Marionette TRACE conn5 -> [0,245,"switchToWindow",{"name":"13"}]
13:33:51 INFO - PROCESS | 1608 | 1483652031082 Marionette TRACE conn5 <- [1,245,null,{}]
13:33:51 INFO - PROCESS | 1608 | 1483652031086 Marionette TRACE conn5 -> [0,246,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/interfaces.html\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/interfaces.html\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:51 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C7DC4000 == 30 [pid = 1608] [id = 58]
13:33:51 INFO - PROCESS | 1608 | ++DOMWINDOW == 77 (000000E3C7DC4800) [pid = 1608] [serial = 171] [outer = 0000000000000000]
13:33:51 INFO - PROCESS | 1608 | ++DOMWINDOW == 78 (000000E3C7DCD800) [pid = 1608] [serial = 172] [outer = 000000E3C7DC4800]
13:33:51 INFO - PROCESS | 1608 | 1483652031142 Marionette DEBUG loaded listener.js
13:33:51 INFO - PROCESS | 1608 | ++DOMWINDOW == 79 (000000E3C7DD4000) [pid = 1608] [serial = 173] [outer = 000000E3C7DC4800]
13:33:51 INFO - PROCESS | 1608 | [1608] WARNING: NS_ENSURE_TRUE(ParseTypeAttribute(type, &version)) failed: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/base/nsScriptLoader.cpp, line 1448
13:33:51 INFO - PROCESS | 1608 | [1608] WARNING: NS_ENSURE_TRUE(ParseTypeAttribute(type, &version)) failed: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/base/nsScriptLoader.cpp, line 1448
13:33:51 INFO - PROCESS | 1608 | [1608] WARNING: NS_ENSURE_TRUE(ParseTypeAttribute(type, &version)) failed: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/base/nsScriptLoader.cpp, line 1448
13:33:52 INFO - PROCESS | 1608 | 1483652032200 Marionette TRACE conn5 <- [1,246,null,{"value":["/XMLHttpRequest/interfaces.html",0,null,null,[["XMLHttpRequestEventTarget interface: existence and properties of interface object",0,null,null],["XMLHttpRequestEventTarget interface object length",0,null,null],["XMLHttpRequestEventTarget interface object name",0,null,null],["XMLHttpRequestEventTarget interface: existence and properties of interface prototype object",0,null,null],["XMLHttpRequestEventTarget interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["XMLHttpRequestEventTarget interface: attribute onloadstart",0,null,null],["XMLHttpRequestEventTarget interface: attribute onprogress",0,null,null],["XMLHttpRequestEventTarget interface: attribute onabort",0,null,null],["XMLHttpRequestEventTarget interface: attribute onerror",0,null,null],["XMLHttpRequestEventTarget interface: attribute onload",0,null,null],["XMLHttpRequestEventTarget interface: attribute ontimeout",0,null,null],["XMLHttpRequestEventTarget interface: attribute onloadend",0,null,null],["XMLHttpRequestUpload interface: existence and properties of interface object",0,null,null],["XMLHttpRequestUpload interface object length",0,null,null],["XMLHttpRequestUpload interface object name",0,null,null],["XMLHttpRequestUpload interface: existence and properties of interface prototype object",0,null,null],["XMLHttpRequestUpload interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["XMLHttpRequestUpload must be primary interface of (new XMLHttpRequest()).upload",0,null,null],["Stringification of (new XMLHttpRequest()).upload",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onloadstart\" with the proper type (0)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onprogress\" with the proper type (1)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onabort\" with the proper type (2)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onerror\" with the proper type (3)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onload\" with the proper type (4)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"ontimeout\" with the proper type (5)",0,null,null],["XMLHttpRequestEventTarget interface: (new XMLHttpRequest()).upload must inherit property \"onloadend\" with the proper type (6)",0,null,null],["EventTarget interface: (new XMLHttpRequest()).upload must inherit property \"addEventListener\" with the proper type (0)",0,null,null],["EventTarget interface: calling addEventListener(DOMString,EventListener,boolean) on (new XMLHttpRequest()).upload with too few arguments must throw TypeError",0,null,null],["EventTarget interface: (new XMLHttpRequest()).upload must inherit property \"removeEventListener\" with the proper type (1)",0,null,null],["EventTarget interface: calling removeEventListener(DOMString,EventListener,boolean) on (new XMLHttpRequest()).upload with too few arguments must throw TypeError",0,null,null],["EventTarget interface: (new XMLHttpRequest()).upload must inherit property \"dispatchEvent\" with the proper type (2)",0,null,null],["EventTarget interface: calling dispatchEvent(Event) on (new XMLHttpRequest()).upload with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: existence and properties of interface object",0,null,null],["XMLHttpRequest interface object length",0,null,null],["XMLHttpRequest interface object name",0,null,null],["XMLHttpRequest interface: existence and properties of interface prototype object",0,null,null],["XMLHttpRequest interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["XMLHttpRequest interface: attribute onreadystatechange",0,null,null],["XMLHttpRequest interface: constant UNSENT on interface object",0,null,null],["XMLHttpRequest interface: constant UNSENT on interface prototype object",0,null,null],["XMLHttpRequest interface: constant OPENED on interface object",0,null,null],["XMLHttpRequest interface: constant OPENED on interface prototype object",0,null,null],["XMLHttpRequest interface: constant HEADERS_RECEIVED on interface object",0,null,null],["XMLHttpRequest interface: constant HEADERS_RECEIVED on interface prototype object",0,null,null],["XMLHttpRequest interface: constant LOADING on interface object",0,null,null],["XMLHttpRequest interface: constant LOADING on interface prototype object",0,null,null],["XMLHttpRequest interface: constant DONE on interface object",0,null,null],["XMLHttpRequest interface: constant DONE on interface prototype object",0,null,null],["XMLHttpRequest interface: attribute readyState",0,null,null],["XMLHttpRequest interface: operation open(ByteString,USVString)",0,null,null],["XMLHttpRequest interface: operation open(ByteString,USVString,boolean,USVString,USVString)",0,null,null],["XMLHttpRequest interface: operation setRequestHeader(ByteString,ByteString)",0,null,null],["XMLHttpRequest interface: attribute timeout",0,null,null],["XMLHttpRequest interface: attribute withCredentials",0,null,null],["XMLHttpRequest interface: attribute upload",0,null,null],["XMLHttpRequest interface: operation send([object Object],[object Object])",0,null,null],["XMLHttpRequest interface: operation abort()",0,null,null],["XMLHttpRequest interface: attribute responseURL",0,null,null],["XMLHttpRequest interface: attribute status",0,null,null],["XMLHttpRequest interface: attribute statusText",0,null,null],["XMLHttpRequest interface: operation getResponseHeader(ByteString)",0,null,null],["XMLHttpRequest interface: operation getAllResponseHeaders()",0,null,null],["XMLHttpRequest interface: operation overrideMimeType(DOMString)",0,null,null],["XMLHttpRequest interface: attribute responseType",0,null,null],["XMLHttpRequest interface: attribute response",0,null,null],["XMLHttpRequest interface: attribute responseText",0,null,null],["XMLHttpRequest interface: attribute responseXML",0,null,null],["XMLHttpRequest must be primary interface of new XMLHttpRequest()",0,null,null],["Stringification of new XMLHttpRequest()",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"onreadystatechange\" with the proper type (0)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"UNSENT\" with the proper type (1)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"OPENED\" with the proper type (2)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"HEADERS_RECEIVED\" with the proper type (3)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"LOADING\" with the proper type (4)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"DONE\" with the proper type (5)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"readyState\" with the proper type (6)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"open\" with the proper type (7)",0,null,null],["XMLHttpRequest interface: calling open(ByteString,USVString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"open\" with the proper type (8)",0,null,null],["XMLHttpRequest interface: calling open(ByteString,USVString,boolean,USVString,USVString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"setRequestHeader\" with the proper type (9)",0,null,null],["XMLHttpRequest interface: calling setRequestHeader(ByteString,ByteString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"timeout\" with the proper type (10)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"withCredentials\" with the proper type (11)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"upload\" with the proper type (12)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"send\" with the proper type (13)",0,null,null],["XMLHttpRequest interface: calling send([object Object],[object Object]) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"abort\" with the proper type (14)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseURL\" with the proper type (15)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"status\" with the proper type (16)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"statusText\" with the proper type (17)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"getResponseHeader\" with the proper type (18)",0,null,null],["XMLHttpRequest interface: calling getResponseHeader(ByteString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"getAllResponseHeaders\" with the proper type (19)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"overrideMimeType\" with the proper type (20)",0,null,null],["XMLHttpRequest interface: calling overrideMimeType(DOMString) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseType\" with the proper type (21)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"response\" with the proper type (22)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseText\" with the proper type (23)",0,null,null],["XMLHttpRequest interface: new XMLHttpRequest() must inherit property \"responseXML\" with the proper type (24)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onloadstart\" with the proper type (0)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onprogress\" with the proper type (1)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onabort\" with the proper type (2)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onerror\" with the proper type (3)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onload\" with the proper type (4)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"ontimeout\" with the proper type (5)",0,null,null],["XMLHttpRequestEventTarget interface: new XMLHttpRequest() must inherit property \"onloadend\" with the proper type (6)",0,null,null],["EventTarget interface: new XMLHttpRequest() must inherit property \"addEventListener\" with the proper type (0)",0,null,null],["EventTarget interface: calling addEventListener(DOMString,EventListener,boolean) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["EventTarget interface: new XMLHttpRequest() must inherit property \"removeEventListener\" with the proper type (1)",0,null,null],["EventTarget interface: calling removeEventListener(DOMString,EventListener,boolean) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["EventTarget interface: new XMLHttpRequest() must inherit property \"dispatchEvent\" with the proper type (2)",0,null,null],["EventTarget interface: calling dispatchEvent(Event) on new XMLHttpRequest() with too few arguments must throw TypeError",0,null,null],["FormData interface: existence and properties of interface object",0,null,null],["FormData interface object length",0,null,null],["FormData interface object name",0,null,null],["FormData interface: existence and properties of interface prototype object",0,null,null],["FormData interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["FormData interface: operation append(USVString,Blob,USVString)",0,null,null],["FormData interface: operation append(USVString,USVString)",0,null,null],["FormData interface: operation delete(USVString)",0,null,null],["FormData interface: operation get(USVString)",0,null,null],["FormData interface: operation getAll(USVString)",0,null,null],["FormData interface: operation has(USVString)",0,null,null],["FormData interface: operation set(USVString,Blob,USVString)",0,null,null],["FormData interface: operation set(USVString,USVString)",0,null,null],["FormData must be primary interface of new FormData()",0,null,null],["Stringification of new FormData()",0,null,null],["FormData interface: new FormData() must inherit property \"append\" with the proper type (0)",0,null,null],["FormData interface: calling append(USVString,Blob,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"append\" with the proper type (1)",0,null,null],["FormData interface: calling append(USVString,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"delete\" with the proper type (2)",0,null,null],["FormData interface: calling delete(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"get\" with the proper type (3)",0,null,null],["FormData interface: calling get(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"getAll\" with the proper type (4)",0,null,null],["FormData interface: calling getAll(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"has\" with the proper type (5)",0,null,null],["FormData interface: calling has(USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"set\" with the proper type (6)",0,null,null],["FormData interface: calling set(USVString,Blob,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData() must inherit property \"set\" with the proper type (7)",0,null,null],["FormData interface: calling set(USVString,USVString) on new FormData() with too few arguments must throw TypeError",0,null,null],["FormData must be primary interface of new FormData(form)",0,null,null],["Stringification of new FormData(form)",0,null,null],["FormData interface: new FormData(form) must inherit property \"append\" with the proper type (0)",0,null,null],["FormData interface: calling append(USVString,Blob,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"append\" with the proper type (1)",0,null,null],["FormData interface: calling append(USVString,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"delete\" with the proper type (2)",0,null,null],["FormData interface: calling delete(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"get\" with the proper type (3)",0,null,null],["FormData interface: calling get(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"getAll\" with the proper type (4)",0,null,null],["FormData interface: calling getAll(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"has\" with the proper type (5)",0,null,null],["FormData interface: calling has(USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"set\" with the proper type (6)",0,null,null],["FormData interface: calling set(USVString,Blob,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["FormData interface: new FormData(form) must inherit property \"set\" with the proper type (7)",0,null,null],["FormData interface: calling set(USVString,USVString) on new FormData(form) with too few arguments must throw TypeError",0,null,null],["ProgressEvent interface: existence and properties of interface object",0,null,null],["ProgressEvent interface object length",0,null,null],["ProgressEvent interface object name",0,null,null],["ProgressEvent interface: existence and properties of interface prototype object",0,null,null],["ProgressEvent interface: existence and properties of interface prototype object's \"constructor\" property",0,null,null],["ProgressEvent interface: attribute lengthComputable",0,null,null],["ProgressEvent interface: attribute loaded",0,null,null],["ProgressEvent interface: attribute total",0,null,null]]]}]
13:33:52 INFO - ..........................................................................................................................................................................
13:33:52 INFO - TEST-OK | /XMLHttpRequest/interfaces.html | took 1370ms
13:33:52 INFO - PROCESS | 1608 | 1483652032316 Marionette TRACE conn5 -> [0,247,"getWindowHandle",null]
13:33:52 INFO - TEST-START | /XMLHttpRequest/open-after-abort.htm
13:33:52 INFO - PROCESS | 1608 | 1483652032322 Marionette TRACE conn5 <- [1,247,null,{"value":"13"}]
13:33:52 INFO - PROCESS | 1608 | 1483652032330 Marionette TRACE conn5 -> [0,248,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:52 INFO - PROCESS | 1608 | 1483652032466 Marionette TRACE conn5 <- [1,248,null,{"value":null}]
13:33:52 INFO - PROCESS | 1608 | 1483652032529 Marionette TRACE conn5 -> [0,249,"getWindowHandles",null]
13:33:52 INFO - PROCESS | 1608 | 1483652032536 Marionette TRACE conn5 <- [1,249,null,["13"]]
13:33:52 INFO - PROCESS | 1608 | 1483652032555 Marionette TRACE conn5 -> [0,250,"switchToWindow",{"name":"13"}]
13:33:52 INFO - PROCESS | 1608 | 1483652032562 Marionette TRACE conn5 <- [1,250,null,{}]
13:33:52 INFO - PROCESS | 1608 | 1483652032567 Marionette TRACE conn5 -> [0,251,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-after-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-after-abort.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:52 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C0C49800 == 31 [pid = 1608] [id = 59]
13:33:52 INFO - PROCESS | 1608 | ++DOMWINDOW == 80 (000000E3C0C4A000) [pid = 1608] [serial = 174] [outer = 0000000000000000]
13:33:52 INFO - PROCESS | 1608 | ++DOMWINDOW == 81 (000000E3C145C000) [pid = 1608] [serial = 175] [outer = 000000E3C0C4A000]
13:33:52 INFO - PROCESS | 1608 | 1483652032647 Marionette DEBUG loaded listener.js
13:33:52 INFO - PROCESS | 1608 | ++DOMWINDOW == 82 (000000E3C2361800) [pid = 1608] [serial = 176] [outer = 000000E3C0C4A000]
13:33:53 INFO - PROCESS | 1608 | 1483652033083 Marionette TRACE conn5 <- [1,251,null,{"value":["/XMLHttpRequest/open-after-abort.htm",0,null,null,[["XMLHttpRequest: open() after abort()",0,null,null]]]}]
13:33:53 INFO - .
13:33:53 INFO - TEST-OK | /XMLHttpRequest/open-after-abort.htm | took 776ms
13:33:53 INFO - PROCESS | 1608 | 1483652033106 Marionette TRACE conn5 -> [0,252,"getWindowHandle",null]
13:33:53 INFO - PROCESS | 1608 | 1483652033110 Marionette TRACE conn5 <- [1,252,null,{"value":"13"}]
13:33:53 INFO - TEST-START | /XMLHttpRequest/open-after-setrequestheader.htm
13:33:53 INFO - PROCESS | 1608 | 1483652033115 Marionette TRACE conn5 -> [0,253,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:53 INFO - PROCESS | 1608 | 1483652033252 Marionette TRACE conn5 <- [1,253,null,{"value":null}]
13:33:53 INFO - PROCESS | 1608 | 1483652033320 Marionette TRACE conn5 -> [0,254,"getWindowHandles",null]
13:33:53 INFO - PROCESS | 1608 | 1483652033324 Marionette TRACE conn5 <- [1,254,null,["13"]]
13:33:53 INFO - PROCESS | 1608 | 1483652033328 Marionette TRACE conn5 -> [0,255,"switchToWindow",{"name":"13"}]
13:33:53 INFO - PROCESS | 1608 | 1483652033333 Marionette TRACE conn5 <- [1,255,null,{}]
13:33:53 INFO - PROCESS | 1608 | 1483652033381 Marionette TRACE conn5 -> [0,256,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-after-setrequestheader.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-after-setrequestheader.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:53 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C63B6000 == 32 [pid = 1608] [id = 60]
13:33:53 INFO - PROCESS | 1608 | ++DOMWINDOW == 83 (000000E3C63BA000) [pid = 1608] [serial = 177] [outer = 0000000000000000]
13:33:53 INFO - PROCESS | 1608 | ++DOMWINDOW == 84 (000000E3C63C9800) [pid = 1608] [serial = 178] [outer = 000000E3C63BA000]
13:33:53 INFO - PROCESS | 1608 | 1483652033453 Marionette DEBUG loaded listener.js
13:33:53 INFO - PROCESS | 1608 | ++DOMWINDOW == 85 (000000E3C7DBF000) [pid = 1608] [serial = 179] [outer = 000000E3C63BA000]
13:33:53 INFO - PROCESS | 1608 | 1483652033864 Marionette TRACE conn5 <- [1,256,null,{"value":["/XMLHttpRequest/open-after-setrequestheader.htm",0,null,null,[["XMLHttpRequest: open() after setRequestHeader()",0,null,null]]]}]
13:33:53 INFO - .
13:33:53 INFO - TEST-OK | /XMLHttpRequest/open-after-setrequestheader.htm | took 774ms
13:33:53 INFO - PROCESS | 1608 | 1483652033901 Marionette TRACE conn5 -> [0,257,"getWindowHandle",null]
13:33:53 INFO - PROCESS | 1608 | 1483652033907 Marionette TRACE conn5 <- [1,257,null,{"value":"13"}]
13:33:53 INFO - TEST-START | /XMLHttpRequest/open-during-abort.htm
13:33:53 INFO - PROCESS | 1608 | 1483652033912 Marionette TRACE conn5 -> [0,258,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:54 INFO - PROCESS | 1608 | 1483652034073 Marionette TRACE conn5 <- [1,258,null,{"value":null}]
13:33:54 INFO - PROCESS | 1608 | 1483652034138 Marionette TRACE conn5 -> [0,259,"getWindowHandles",null]
13:33:54 INFO - PROCESS | 1608 | 1483652034142 Marionette TRACE conn5 <- [1,259,null,["13"]]
13:33:54 INFO - PROCESS | 1608 | 1483652034145 Marionette TRACE conn5 -> [0,260,"switchToWindow",{"name":"13"}]
13:33:54 INFO - PROCESS | 1608 | 1483652034152 Marionette TRACE conn5 <- [1,260,null,{}]
13:33:54 INFO - PROCESS | 1608 | 1483652034197 Marionette TRACE conn5 -> [0,261,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-during-abort.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-during-abort.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:54 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CCE99000 == 33 [pid = 1608] [id = 61]
13:33:54 INFO - PROCESS | 1608 | ++DOMWINDOW == 86 (000000E3CCE9B000) [pid = 1608] [serial = 180] [outer = 0000000000000000]
13:33:54 INFO - PROCESS | 1608 | ++DOMWINDOW == 87 (000000E3CD506800) [pid = 1608] [serial = 181] [outer = 000000E3CCE9B000]
13:33:54 INFO - PROCESS | 1608 | 1483652034274 Marionette DEBUG loaded listener.js
13:33:54 INFO - PROCESS | 1608 | ++DOMWINDOW == 88 (000000E3CD5B8800) [pid = 1608] [serial = 182] [outer = 000000E3CCE9B000]
13:33:54 INFO - PROCESS | 1608 | 1483652034718 Marionette TRACE conn5 <- [1,261,null,{"value":["/XMLHttpRequest/open-during-abort.htm",0,null,null,[["XMLHttpRequest: open() during abort()",0,null,null]]]}]
13:33:54 INFO - .
13:33:54 INFO - TEST-OK | /XMLHttpRequest/open-during-abort.htm | took 838ms
13:33:54 INFO - PROCESS | 1608 | 1483652034751 Marionette TRACE conn5 -> [0,262,"getWindowHandle",null]
13:33:54 INFO - PROCESS | 1608 | 1483652034755 Marionette TRACE conn5 <- [1,262,null,{"value":"13"}]
13:33:54 INFO - TEST-START | /XMLHttpRequest/open-method-bogus.htm
13:33:54 INFO - PROCESS | 1608 | 1483652034760 Marionette TRACE conn5 -> [0,263,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:54 INFO - PROCESS | 1608 | 1483652034887 Marionette TRACE conn5 <- [1,263,null,{"value":null}]
13:33:54 INFO - PROCESS | 1608 | 1483652034951 Marionette TRACE conn5 -> [0,264,"getWindowHandles",null]
13:33:54 INFO - PROCESS | 1608 | 1483652034954 Marionette TRACE conn5 <- [1,264,null,["13"]]
13:33:54 INFO - PROCESS | 1608 | 1483652034958 Marionette TRACE conn5 -> [0,265,"switchToWindow",{"name":"13"}]
13:33:54 INFO - PROCESS | 1608 | 1483652034962 Marionette TRACE conn5 <- [1,265,null,{}]
13:33:55 INFO - PROCESS | 1608 | 1483652035010 Marionette TRACE conn5 -> [0,266,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-bogus.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-bogus.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:55 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CED9C800 == 34 [pid = 1608] [id = 62]
13:33:55 INFO - PROCESS | 1608 | ++DOMWINDOW == 89 (000000E3CED9D800) [pid = 1608] [serial = 183] [outer = 0000000000000000]
13:33:55 INFO - PROCESS | 1608 | ++DOMWINDOW == 90 (000000E3CEA4A000) [pid = 1608] [serial = 184] [outer = 000000E3CED9D800]
13:33:55 INFO - PROCESS | 1608 | 1483652035080 Marionette DEBUG loaded listener.js
13:33:55 INFO - PROCESS | 1608 | ++DOMWINDOW == 91 (000000E3CEA51000) [pid = 1608] [serial = 185] [outer = 000000E3CED9D800]
13:33:55 INFO - PROCESS | 1608 | [1608] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
13:33:55 INFO - PROCESS | 1608 | [1608] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
13:33:55 INFO - PROCESS | 1608 | [1608] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
13:33:55 INFO - PROCESS | 1608 | [1608] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
13:33:55 INFO - PROCESS | 1608 | [1608] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
13:33:55 INFO - PROCESS | 1608 | [1608] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
13:33:55 INFO - PROCESS | 1608 | [1608] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
13:33:55 INFO - PROCESS | 1608 | [1608] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
13:33:55 INFO - PROCESS | 1608 | 1483652035524 Marionette TRACE conn5 <- [1,266,null,{"value":["/XMLHttpRequest/open-method-bogus.htm",0,null,null,[["XMLHttpRequest: open() - bogus methods ()",0,null,null],["XMLHttpRequest: open() - bogus methods (>)",0,null,null],["XMLHttpRequest: open() - bogus methods ( GET)",0,null,null],["XMLHttpRequest: open() - bogus methods (G T)",0,null,null],["XMLHttpRequest: open() - bogus methods (@GET)",0,null,null],["XMLHttpRequest: open() - bogus methods (G:ET)",0,null,null],["XMLHttpRequest: open() - bogus methods (GET?)",0,null,null],["XMLHttpRequest: open() - bogus methods (GET\n)",0,null,null]]]}]
13:33:55 INFO - ........
13:33:55 INFO - TEST-OK | /XMLHttpRequest/open-method-bogus.htm | took 776ms
13:33:55 INFO - PROCESS | 1608 | 1483652035537 Marionette TRACE conn5 -> [0,267,"getWindowHandle",null]
13:33:55 INFO - TEST-START | /XMLHttpRequest/open-method-case-insensitive.htm
13:33:55 INFO - PROCESS | 1608 | 1483652035539 Marionette TRACE conn5 <- [1,267,null,{"value":"13"}]
13:33:55 INFO - PROCESS | 1608 | 1483652035544 Marionette TRACE conn5 -> [0,268,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:55 INFO - PROCESS | 1608 | 1483652035660 Marionette TRACE conn5 <- [1,268,null,{"value":null}]
13:33:55 INFO - PROCESS | 1608 | 1483652035724 Marionette TRACE conn5 -> [0,269,"getWindowHandles",null]
13:33:55 INFO - PROCESS | 1608 | 1483652035727 Marionette TRACE conn5 <- [1,269,null,["13"]]
13:33:55 INFO - PROCESS | 1608 | 1483652035730 Marionette TRACE conn5 -> [0,270,"switchToWindow",{"name":"13"}]
13:33:55 INFO - PROCESS | 1608 | 1483652035735 Marionette TRACE conn5 <- [1,270,null,{}]
13:33:55 INFO - PROCESS | 1608 | 1483652035738 Marionette TRACE conn5 -> [0,271,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-case-insensitive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-case-insensitive.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:55 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CEA67000 == 35 [pid = 1608] [id = 63]
13:33:55 INFO - PROCESS | 1608 | ++DOMWINDOW == 92 (000000E3CEA67800) [pid = 1608] [serial = 186] [outer = 0000000000000000]
13:33:55 INFO - PROCESS | 1608 | ++DOMWINDOW == 93 (000000E3C959E000) [pid = 1608] [serial = 187] [outer = 000000E3CEA67800]
13:33:55 INFO - PROCESS | 1608 | 1483652035848 Marionette DEBUG loaded listener.js
13:33:55 INFO - PROCESS | 1608 | ++DOMWINDOW == 94 (000000E3C95A7800) [pid = 1608] [serial = 188] [outer = 000000E3CEA67800]
13:33:56 INFO - PROCESS | 1608 | 1483652036305 Marionette TRACE conn5 <- [1,271,null,{"value":["/XMLHttpRequest/open-method-case-insensitive.htm",0,null,null,[["XMLHttpRequest: open() - case-insensitive methods test (DELETE)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (GET)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (HEAD)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (OPTIONS)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (POST)",0,null,null],["XMLHttpRequest: open() - case-insensitive methods test (PUT)",0,null,null]]]}]
13:33:56 INFO - ......
13:33:56 INFO - TEST-OK | /XMLHttpRequest/open-method-case-insensitive.htm | took 776ms
13:33:56 INFO - PROCESS | 1608 | 1483652036366 Marionette TRACE conn5 -> [0,272,"getWindowHandle",null]
13:33:56 INFO - PROCESS | 1608 | 1483652036369 Marionette TRACE conn5 <- [1,272,null,{"value":"13"}]
13:33:56 INFO - TEST-START | /XMLHttpRequest/open-method-case-sensitive.htm
13:33:56 INFO - PROCESS | 1608 | 1483652036374 Marionette TRACE conn5 -> [0,273,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:56 INFO - PROCESS | 1608 | 1483652036526 Marionette TRACE conn5 <- [1,273,null,{"value":null}]
13:33:56 INFO - PROCESS | 1608 | 1483652036589 Marionette TRACE conn5 -> [0,274,"getWindowHandles",null]
13:33:56 INFO - PROCESS | 1608 | 1483652036592 Marionette TRACE conn5 <- [1,274,null,["13"]]
13:33:56 INFO - PROCESS | 1608 | 1483652036595 Marionette TRACE conn5 -> [0,275,"switchToWindow",{"name":"13"}]
13:33:56 INFO - PROCESS | 1608 | 1483652036600 Marionette TRACE conn5 <- [1,275,null,{}]
13:33:56 INFO - PROCESS | 1608 | 1483652036604 Marionette TRACE conn5 -> [0,276,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-case-sensitive.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-case-sensitive.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:56 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C0C54800 == 36 [pid = 1608] [id = 64]
13:33:56 INFO - PROCESS | 1608 | ++DOMWINDOW == 95 (000000E3C1003000) [pid = 1608] [serial = 189] [outer = 0000000000000000]
13:33:56 INFO - PROCESS | 1608 | ++DOMWINDOW == 96 (000000E3C2166800) [pid = 1608] [serial = 190] [outer = 000000E3C1003000]
13:33:56 INFO - PROCESS | 1608 | 1483652036828 Marionette DEBUG loaded listener.js
13:33:56 INFO - PROCESS | 1608 | ++DOMWINDOW == 97 (000000E3C5FB9800) [pid = 1608] [serial = 191] [outer = 000000E3C1003000]
13:33:57 INFO - PROCESS | 1608 | 1483652037324 Marionette TRACE conn5 <- [1,276,null,{"value":["/XMLHttpRequest/open-method-case-sensitive.htm",0,null,null,[["XMLHttpRequest: open() - case-sensitive methods test (XUNICORN)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (xUNIcorn)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (chiCKEN)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (PATCH)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (patCH)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (copy)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (COpy)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (inDEX)",0,null,null],["XMLHttpRequest: open() - case-sensitive methods test (movE)",0,null,null]]]}]
13:33:57 INFO - .........
13:33:57 INFO - TEST-OK | /XMLHttpRequest/open-method-case-sensitive.htm | took 985ms
13:33:57 INFO - PROCESS | 1608 | 1483652037362 Marionette TRACE conn5 -> [0,277,"getWindowHandle",null]
13:33:57 INFO - PROCESS | 1608 | 1483652037367 Marionette TRACE conn5 <- [1,277,null,{"value":"13"}]
13:33:57 INFO - TEST-START | /XMLHttpRequest/open-method-insecure.htm
13:33:57 INFO - PROCESS | 1608 | 1483652037375 Marionette TRACE conn5 -> [0,278,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:57 INFO - PROCESS | 1608 | 1483652037498 Marionette TRACE conn5 <- [1,278,null,{"value":null}]
13:33:57 INFO - PROCESS | 1608 | 1483652037576 Marionette TRACE conn5 -> [0,279,"getWindowHandles",null]
13:33:57 INFO - PROCESS | 1608 | 1483652037582 Marionette TRACE conn5 <- [1,279,null,["13"]]
13:33:57 INFO - PROCESS | 1608 | 1483652037586 Marionette TRACE conn5 -> [0,280,"switchToWindow",{"name":"13"}]
13:33:57 INFO - PROCESS | 1608 | 1483652037591 Marionette TRACE conn5 <- [1,280,null,{}]
13:33:57 INFO - PROCESS | 1608 | 1483652037595 Marionette TRACE conn5 -> [0,281,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-insecure.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-insecure.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:57 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C1069000 == 37 [pid = 1608] [id = 65]
13:33:57 INFO - PROCESS | 1608 | ++DOMWINDOW == 98 (000000E3C1281800) [pid = 1608] [serial = 192] [outer = 0000000000000000]
13:33:57 INFO - PROCESS | 1608 | ++DOMWINDOW == 99 (000000E3C235F800) [pid = 1608] [serial = 193] [outer = 000000E3C1281800]
13:33:57 INFO - PROCESS | 1608 | 1483652037659 Marionette DEBUG loaded listener.js
13:33:57 INFO - PROCESS | 1608 | ++DOMWINDOW == 100 (000000E3C5FCD800) [pid = 1608] [serial = 194] [outer = 000000E3C1281800]
13:33:57 INFO - PROCESS | 1608 | [1608] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
13:33:57 INFO - PROCESS | 1608 | [1608] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
13:33:57 INFO - PROCESS | 1608 | [1608] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
13:33:58 INFO - PROCESS | 1608 | [1608] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
13:33:58 INFO - PROCESS | 1608 | [1608] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
13:33:58 INFO - PROCESS | 1608 | [1608] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
13:33:58 INFO - PROCESS | 1608 | [1608] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
13:33:58 INFO - PROCESS | 1608 | [1608] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
13:33:58 INFO - PROCESS | 1608 | [1608] WARNING: 'NS_FAILED(rv)', file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 1459
13:33:58 INFO - PROCESS | 1608 | --DOMWINDOW == 99 (000000E3C767A800) [pid = 1608] [serial = 122] [outer = 0000000000000000] [url = about:blank]
13:33:58 INFO - PROCESS | 1608 | --DOMWINDOW == 98 (000000E3C716F800) [pid = 1608] [serial = 121] [outer = 0000000000000000] [url = about:blank]
13:33:58 INFO - PROCESS | 1608 | --DOMWINDOW == 97 (000000E3C89C5000) [pid = 1608] [serial = 125] [outer = 0000000000000000] [url = about:blank]
13:33:58 INFO - PROCESS | 1608 | --DOMWINDOW == 96 (000000E3C7D22000) [pid = 1608] [serial = 124] [outer = 0000000000000000] [url = about:blank]
13:33:58 INFO - PROCESS | 1608 | --DOMWINDOW == 95 (000000E3C4F6F000) [pid = 1608] [serial = 118] [outer = 0000000000000000] [url = about:blank]
13:33:58 INFO - PROCESS | 1608 | --DOMWINDOW == 94 (000000E3C5FAB000) [pid = 1608] [serial = 119] [outer = 0000000000000000] [url = about:blank]
13:33:58 INFO - PROCESS | 1608 | --DOMWINDOW == 93 (000000E3C2362800) [pid = 1608] [serial = 115] [outer = 0000000000000000] [url = about:blank]
13:33:58 INFO - PROCESS | 1608 | --DOMWINDOW == 92 (000000E3C2376800) [pid = 1608] [serial = 116] [outer = 0000000000000000] [url = about:blank]
13:33:58 INFO - PROCESS | 1608 | --DOMWINDOW == 91 (000000E3C09A2000) [pid = 1608] [serial = 112] [outer = 0000000000000000] [url = about:blank]
13:33:58 INFO - PROCESS | 1608 | --DOMWINDOW == 90 (000000E3C09C1000) [pid = 1608] [serial = 113] [outer = 0000000000000000] [url = about:blank]
13:33:58 INFO - PROCESS | 1608 | --DOMWINDOW == 89 (000000E3BC41E800) [pid = 1608] [serial = 109] [outer = 0000000000000000] [url = about:blank]
13:33:58 INFO - PROCESS | 1608 | --DOMWINDOW == 88 (000000E3BC9E2800) [pid = 1608] [serial = 110] [outer = 0000000000000000] [url = about:blank]
13:33:58 INFO - PROCESS | 1608 | --DOMWINDOW == 87 (000000E3C8B8E000) [pid = 1608] [serial = 127] [outer = 0000000000000000] [url = about:blank]
13:33:58 INFO - PROCESS | 1608 | 1483652038087 Marionette TRACE conn5 <- [1,281,null,{"value":["/XMLHttpRequest/open-method-insecure.htm",0,null,null,[["XMLHttpRequest: open() - \"insecure\" methods (track)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (TRACK)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (trAck)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (TRACE)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (trace)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (traCE)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (connect)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (CONNECT)",0,null,null],["XMLHttpRequest: open() - \"insecure\" methods (connECT)",0,null,null]]]}]
13:33:58 INFO - .........
13:33:58 INFO - TEST-OK | /XMLHttpRequest/open-method-insecure.htm | took 777ms
13:33:58 INFO - PROCESS | 1608 | 1483652038153 Marionette TRACE conn5 -> [0,282,"getWindowHandle",null]
13:33:58 INFO - PROCESS | 1608 | 1483652038156 Marionette TRACE conn5 <- [1,282,null,{"value":"13"}]
13:33:58 INFO - TEST-START | /XMLHttpRequest/open-method-responsetype-set-sync.htm
13:33:58 INFO - PROCESS | 1608 | 1483652038161 Marionette TRACE conn5 -> [0,283,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:58 INFO - PROCESS | 1608 | 1483652038266 Marionette TRACE conn5 <- [1,283,null,{"value":null}]
13:33:58 INFO - PROCESS | 1608 | 1483652038273 Marionette TRACE conn5 -> [0,284,"getWindowHandles",null]
13:33:58 INFO - PROCESS | 1608 | 1483652038276 Marionette TRACE conn5 <- [1,284,null,["13"]]
13:33:58 INFO - PROCESS | 1608 | 1483652038279 Marionette TRACE conn5 -> [0,285,"switchToWindow",{"name":"13"}]
13:33:58 INFO - PROCESS | 1608 | 1483652038283 Marionette TRACE conn5 <- [1,285,null,{}]
13:33:58 INFO - PROCESS | 1608 | 1483652038288 Marionette TRACE conn5 -> [0,286,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-method-responsetype-set-sync.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-method-responsetype-set-sync.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:58 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C0C52000 == 38 [pid = 1608] [id = 66]
13:33:58 INFO - PROCESS | 1608 | ++DOMWINDOW == 88 (000000E3C0C5B000) [pid = 1608] [serial = 195] [outer = 0000000000000000]
13:33:58 INFO - PROCESS | 1608 | ++DOMWINDOW == 89 (000000E3C1716800) [pid = 1608] [serial = 196] [outer = 000000E3C0C5B000]
13:33:58 INFO - PROCESS | 1608 | 1483652038345 Marionette DEBUG loaded listener.js
13:33:58 INFO - PROCESS | 1608 | ++DOMWINDOW == 90 (000000E3C2914800) [pid = 1608] [serial = 197] [outer = 000000E3C0C5B000]
13:33:58 INFO - PROCESS | 1608 | 1483652038728 Marionette TRACE conn5 <- [1,286,null,{"value":["/XMLHttpRequest/open-method-responsetype-set-sync.htm",0,null,null,[["XMLHttpRequest: open() sync request not allowed if responseType is set (arraybuffer)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (blob)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (json)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (text)",0,null,null],["XMLHttpRequest: open() sync request not allowed if responseType is set (document)",0,null,null]]]}]
13:33:58 INFO - .....
13:33:58 INFO - TEST-OK | /XMLHttpRequest/open-method-responsetype-set-sync.htm | took 628ms
13:33:58 INFO - PROCESS | 1608 | 1483652038797 Marionette TRACE conn5 -> [0,287,"getWindowHandle",null]
13:33:58 INFO - PROCESS | 1608 | 1483652038802 Marionette TRACE conn5 <- [1,287,null,{"value":"13"}]
13:33:58 INFO - TEST-START | /XMLHttpRequest/open-open-send.htm
13:33:58 INFO - PROCESS | 1608 | 1483652038807 Marionette TRACE conn5 -> [0,288,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:58 INFO - PROCESS | 1608 | 1483652038912 Marionette TRACE conn5 <- [1,288,null,{"value":null}]
13:33:58 INFO - PROCESS | 1608 | 1483652038920 Marionette TRACE conn5 -> [0,289,"getWindowHandles",null]
13:33:58 INFO - PROCESS | 1608 | 1483652038923 Marionette TRACE conn5 <- [1,289,null,["13"]]
13:33:58 INFO - PROCESS | 1608 | 1483652038927 Marionette TRACE conn5 -> [0,290,"switchToWindow",{"name":"13"}]
13:33:58 INFO - PROCESS | 1608 | 1483652038932 Marionette TRACE conn5 <- [1,290,null,{}]
13:33:58 INFO - PROCESS | 1608 | 1483652038937 Marionette TRACE conn5 -> [0,291,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-open-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-open-send.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:58 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C77C1800 == 39 [pid = 1608] [id = 67]
13:33:58 INFO - PROCESS | 1608 | ++DOMWINDOW == 91 (000000E3C77C3000) [pid = 1608] [serial = 198] [outer = 0000000000000000]
13:33:58 INFO - PROCESS | 1608 | ++DOMWINDOW == 92 (000000E3C7D20800) [pid = 1608] [serial = 199] [outer = 000000E3C77C3000]
13:33:59 INFO - PROCESS | 1608 | 1483652038994 Marionette DEBUG loaded listener.js
13:33:59 INFO - PROCESS | 1608 | ++DOMWINDOW == 93 (000000E3C7D13800) [pid = 1608] [serial = 200] [outer = 000000E3C77C3000]
13:33:59 INFO - PROCESS | 1608 | 1483652039360 Marionette TRACE conn5 <- [1,291,null,{"value":["/XMLHttpRequest/open-open-send.htm",0,null,null,[["XMLHttpRequest: open() - open() - send()",0,null,null]]]}]
13:33:59 INFO - .
13:33:59 INFO - TEST-OK | /XMLHttpRequest/open-open-send.htm | took 585ms
13:33:59 INFO - TEST-START | /XMLHttpRequest/open-open-sync-send.htm
13:33:59 INFO - PROCESS | 1608 | 1483652039394 Marionette TRACE conn5 -> [0,292,"getWindowHandle",null]
13:33:59 INFO - PROCESS | 1608 | 1483652039397 Marionette TRACE conn5 <- [1,292,null,{"value":"13"}]
13:33:59 INFO - PROCESS | 1608 | 1483652039402 Marionette TRACE conn5 -> [0,293,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:33:59 INFO - PROCESS | 1608 | 1483652039502 Marionette TRACE conn5 <- [1,293,null,{"value":null}]
13:33:59 INFO - PROCESS | 1608 | 1483652039508 Marionette TRACE conn5 -> [0,294,"getWindowHandles",null]
13:33:59 INFO - PROCESS | 1608 | 1483652039510 Marionette TRACE conn5 <- [1,294,null,["13"]]
13:33:59 INFO - PROCESS | 1608 | 1483652039514 Marionette TRACE conn5 -> [0,295,"switchToWindow",{"name":"13"}]
13:33:59 INFO - PROCESS | 1608 | 1483652039518 Marionette TRACE conn5 <- [1,295,null,{}]
13:33:59 INFO - PROCESS | 1608 | 1483652039522 Marionette TRACE conn5 -> [0,296,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-open-sync-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-open-sync-send.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:33:59 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C8B76800 == 40 [pid = 1608] [id = 68]
13:33:59 INFO - PROCESS | 1608 | ++DOMWINDOW == 94 (000000E3C8B78000) [pid = 1608] [serial = 201] [outer = 0000000000000000]
13:33:59 INFO - PROCESS | 1608 | ++DOMWINDOW == 95 (000000E3C8B8F800) [pid = 1608] [serial = 202] [outer = 000000E3C8B78000]
13:33:59 INFO - PROCESS | 1608 | 1483652039579 Marionette DEBUG loaded listener.js
13:33:59 INFO - PROCESS | 1608 | ++DOMWINDOW == 96 (000000E3C8DBC800) [pid = 1608] [serial = 203] [outer = 000000E3C8B78000]
13:33:59 INFO - PROCESS | 1608 | 1483652039955 Marionette TRACE conn5 <- [1,296,null,{"value":["/XMLHttpRequest/open-open-sync-send.htm",0,null,null,[["XMLHttpRequest: open() - open() (sync) - send()",0,null,null]]]}]
13:33:59 INFO - .
13:33:59 INFO - TEST-OK | /XMLHttpRequest/open-open-sync-send.htm | took 587ms
13:33:59 INFO - PROCESS | 1608 | 1483652039990 Marionette TRACE conn5 -> [0,297,"getWindowHandle",null]
13:33:59 INFO - PROCESS | 1608 | 1483652039992 Marionette TRACE conn5 <- [1,297,null,{"value":"13"}]
13:34:00 INFO - TEST-START | /XMLHttpRequest/open-referer.htm
13:34:00 INFO - PROCESS | 1608 | 1483652039997 Marionette TRACE conn5 -> [0,298,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:34:00 INFO - PROCESS | 1608 | 1483652040129 Marionette TRACE conn5 <- [1,298,null,{"value":null}]
13:34:00 INFO - PROCESS | 1608 | 1483652040136 Marionette TRACE conn5 -> [0,299,"getWindowHandles",null]
13:34:00 INFO - PROCESS | 1608 | 1483652040138 Marionette TRACE conn5 <- [1,299,null,["13"]]
13:34:00 INFO - PROCESS | 1608 | 1483652040141 Marionette TRACE conn5 -> [0,300,"switchToWindow",{"name":"13"}]
13:34:00 INFO - PROCESS | 1608 | 1483652040145 Marionette TRACE conn5 <- [1,300,null,{}]
13:34:00 INFO - PROCESS | 1608 | 1483652040150 Marionette TRACE conn5 -> [0,301,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-referer.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-referer.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:34:00 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C9B16000 == 41 [pid = 1608] [id = 69]
13:34:00 INFO - PROCESS | 1608 | ++DOMWINDOW == 97 (000000E3C9B20800) [pid = 1608] [serial = 204] [outer = 0000000000000000]
13:34:00 INFO - PROCESS | 1608 | ++DOMWINDOW == 98 (000000E3C9EEC800) [pid = 1608] [serial = 205] [outer = 000000E3C9B20800]
13:34:00 INFO - PROCESS | 1608 | 1483652040219 Marionette DEBUG loaded listener.js
13:34:00 INFO - PROCESS | 1608 | ++DOMWINDOW == 99 (000000E3CB98A000) [pid = 1608] [serial = 206] [outer = 000000E3C9B20800]
13:34:00 INFO - PROCESS | 1608 | 1483652040618 Marionette TRACE conn5 <- [1,301,null,{"value":["/XMLHttpRequest/open-referer.htm",0,null,null,[["XMLHttpRequest: open() - value of Referer header",0,null,null]]]}]
13:34:00 INFO - .
13:34:00 INFO - TEST-OK | /XMLHttpRequest/open-referer.htm | took 671ms
13:34:00 INFO - PROCESS | 1608 | 1483652040676 Marionette TRACE conn5 -> [0,302,"getWindowHandle",null]
13:34:00 INFO - PROCESS | 1608 | 1483652040678 Marionette TRACE conn5 <- [1,302,null,{"value":"13"}]
13:34:00 INFO - TEST-START | /XMLHttpRequest/open-send-open.htm
13:34:00 INFO - PROCESS | 1608 | 1483652040683 Marionette TRACE conn5 -> [0,303,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:34:00 INFO - PROCESS | 1608 | 1483652040812 Marionette TRACE conn5 <- [1,303,null,{"value":null}]
13:34:00 INFO - PROCESS | 1608 | 1483652040818 Marionette TRACE conn5 -> [0,304,"getWindowHandles",null]
13:34:00 INFO - PROCESS | 1608 | 1483652040821 Marionette TRACE conn5 <- [1,304,null,["13"]]
13:34:00 INFO - PROCESS | 1608 | 1483652040861 Marionette TRACE conn5 -> [0,305,"switchToWindow",{"name":"13"}]
13:34:00 INFO - PROCESS | 1608 | 1483652040865 Marionette TRACE conn5 <- [1,305,null,{}]
13:34:00 INFO - PROCESS | 1608 | 1483652040868 Marionette TRACE conn5 -> [0,306,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-send-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-send-open.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:34:00 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CCE9E800 == 42 [pid = 1608] [id = 70]
13:34:00 INFO - PROCESS | 1608 | ++DOMWINDOW == 100 (000000E3CD509800) [pid = 1608] [serial = 207] [outer = 0000000000000000]
13:34:00 INFO - PROCESS | 1608 | ++DOMWINDOW == 101 (000000E3CDFE6800) [pid = 1608] [serial = 208] [outer = 000000E3CD509800]
13:34:00 INFO - PROCESS | 1608 | 1483652040924 Marionette DEBUG loaded listener.js
13:34:01 INFO - PROCESS | 1608 | ++DOMWINDOW == 102 (000000E3CDFF7000) [pid = 1608] [serial = 209] [outer = 000000E3CD509800]
13:34:01 INFO - PROCESS | 1608 | 1483652041290 Marionette TRACE conn5 <- [1,306,null,{"value":["/XMLHttpRequest/open-send-open.htm",0,null,null,[["XMLHttpRequest: open() - send() - open()",0,null,null]]]}]
13:34:01 INFO - .
13:34:01 INFO - TEST-OK | /XMLHttpRequest/open-send-open.htm | took 630ms
13:34:01 INFO - PROCESS | 1608 | 1483652041314 Marionette TRACE conn5 -> [0,307,"getWindowHandle",null]
13:34:01 INFO - PROCESS | 1608 | 1483652041316 Marionette TRACE conn5 <- [1,307,null,{"value":"13"}]
13:34:01 INFO - TEST-START | /XMLHttpRequest/open-sync-open-send.htm
13:34:01 INFO - PROCESS | 1608 | 1483652041327 Marionette TRACE conn5 -> [0,308,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:34:01 INFO - PROCESS | 1608 | 1483652041444 Marionette TRACE conn5 <- [1,308,null,{"value":null}]
13:34:01 INFO - PROCESS | 1608 | 1483652041449 Marionette TRACE conn5 -> [0,309,"getWindowHandles",null]
13:34:01 INFO - PROCESS | 1608 | 1483652041452 Marionette TRACE conn5 <- [1,309,null,["13"]]
13:34:01 INFO - PROCESS | 1608 | 1483652041455 Marionette TRACE conn5 -> [0,310,"switchToWindow",{"name":"13"}]
13:34:01 INFO - PROCESS | 1608 | 1483652041458 Marionette TRACE conn5 <- [1,310,null,{}]
13:34:01 INFO - PROCESS | 1608 | 1483652041499 Marionette TRACE conn5 -> [0,311,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-sync-open-send.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-sync-open-send.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:34:01 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CE741000 == 43 [pid = 1608] [id = 71]
13:34:01 INFO - PROCESS | 1608 | ++DOMWINDOW == 103 (000000E3CE741800) [pid = 1608] [serial = 210] [outer = 0000000000000000]
13:34:01 INFO - PROCESS | 1608 | ++DOMWINDOW == 104 (000000E3CEA50000) [pid = 1608] [serial = 211] [outer = 000000E3CE741800]
13:34:01 INFO - PROCESS | 1608 | 1483652041554 Marionette DEBUG loaded listener.js
13:34:01 INFO - PROCESS | 1608 | ++DOMWINDOW == 105 (000000E3CEA5B800) [pid = 1608] [serial = 212] [outer = 000000E3CE741800]
13:34:01 INFO - PROCESS | 1608 | 1483652041899 Marionette TRACE conn5 <- [1,311,null,{"value":["/XMLHttpRequest/open-sync-open-send.htm",0,null,null,[["XMLHttpRequest: open() (sync) - send() - open()",0,null,null]]]}]
13:34:01 INFO - .
13:34:01 INFO - TEST-OK | /XMLHttpRequest/open-sync-open-send.htm | took 629ms
13:34:01 INFO - PROCESS | 1608 | 1483652041952 Marionette TRACE conn5 -> [0,312,"getWindowHandle",null]
13:34:01 INFO - PROCESS | 1608 | 1483652041954 Marionette TRACE conn5 <- [1,312,null,{"value":"13"}]
13:34:01 INFO - TEST-START | /XMLHttpRequest/open-url-about-blank-window.htm
13:34:01 INFO - PROCESS | 1608 | 1483652041965 Marionette TRACE conn5 -> [0,313,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:34:02 INFO - PROCESS | 1608 | 1483652042081 Marionette TRACE conn5 <- [1,313,null,{"value":null}]
13:34:02 INFO - PROCESS | 1608 | 1483652042086 Marionette TRACE conn5 -> [0,314,"getWindowHandles",null]
13:34:02 INFO - PROCESS | 1608 | 1483652042089 Marionette TRACE conn5 <- [1,314,null,["13"]]
13:34:02 INFO - PROCESS | 1608 | 1483652042092 Marionette TRACE conn5 -> [0,315,"switchToWindow",{"name":"13"}]
13:34:02 INFO - PROCESS | 1608 | 1483652042095 Marionette TRACE conn5 <- [1,315,null,{}]
13:34:02 INFO - PROCESS | 1608 | 1483652042137 Marionette TRACE conn5 -> [0,316,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-about-blank-window.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-about-blank-window.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:34:02 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C2653000 == 44 [pid = 1608] [id = 72]
13:34:02 INFO - PROCESS | 1608 | ++DOMWINDOW == 106 (000000E3C2653800) [pid = 1608] [serial = 213] [outer = 0000000000000000]
13:34:02 INFO - PROCESS | 1608 | ++DOMWINDOW == 107 (000000E3C2657800) [pid = 1608] [serial = 214] [outer = 000000E3C2653800]
13:34:02 INFO - PROCESS | 1608 | 1483652042192 Marionette DEBUG loaded listener.js
13:34:02 INFO - PROCESS | 1608 | ++DOMWINDOW == 108 (000000E3C265E800) [pid = 1608] [serial = 215] [outer = 000000E3C2653800]
13:34:02 INFO - PROCESS | 1608 | --DOMWINDOW == 107 (000000E3CE1AB800) [pid = 1608] [serial = 165] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-unsent-opened-state.htm]
13:34:02 INFO - PROCESS | 1608 | --DOMWINDOW == 106 (000000E3CE734800) [pid = 1608] [serial = 168] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/headers-normalize-response.htm]
13:34:02 INFO - PROCESS | 1608 | --DOMWINDOW == 105 (000000E3C1511000) [pid = 1608] [serial = 147] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-case-insensitive.htm]
13:34:02 INFO - PROCESS | 1608 | --DOMWINDOW == 104 (000000E3C8FD2000) [pid = 1608] [serial = 153] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-cookies-and-more.htm]
13:34:02 INFO - PROCESS | 1608 | --DOMWINDOW == 103 (000000E3CD519800) [pid = 1608] [serial = 159] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-server-date.htm]
13:34:02 INFO - PROCESS | 1608 | --DOMWINDOW == 102 (000000E3CDFF6000) [pid = 1608] [serial = 162] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-special-characters.htm]
13:34:02 INFO - PROCESS | 1608 | --DOMWINDOW == 101 (000000E3BD059800) [pid = 1608] [serial = 144] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/getallresponseheaders-status.htm]
13:34:02 INFO - PROCESS | 1608 | --DOMWINDOW == 100 (000000E3C77B6000) [pid = 1608] [serial = 150] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-chunked-trailer.htm]
13:34:02 INFO - PROCESS | 1608 | --DOMWINDOW == 99 (000000E3CBA8D800) [pid = 1608] [serial = 156] [outer = 0000000000000000] [url = http://web-platform.test:8000/XMLHttpRequest/getresponseheader-error-state.htm]
13:34:02 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3BB2CA800 == 45 [pid = 1608] [id = 73]
13:34:02 INFO - PROCESS | 1608 | ++DOMWINDOW == 100 (000000E3C266B000) [pid = 1608] [serial = 216] [outer = 0000000000000000]
13:34:02 INFO - PROCESS | 1608 | ++DOMWINDOW == 101 (000000E3C2661800) [pid = 1608] [serial = 217] [outer = 000000E3C266B000]
13:34:02 INFO - PROCESS | 1608 | 1483652042699 Marionette TRACE conn5 <- [1,316,null,{"value":["/XMLHttpRequest/open-url-about-blank-window.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs (about:blank iframe)",0,null,null]]]}]
13:34:02 INFO - .
13:34:02 INFO - TEST-OK | /XMLHttpRequest/open-url-about-blank-window.htm | took 774ms
13:34:02 INFO - PROCESS | 1608 | 1483652042735 Marionette TRACE conn5 -> [0,317,"getWindowHandle",null]
13:34:02 INFO - PROCESS | 1608 | 1483652042737 Marionette TRACE conn5 <- [1,317,null,{"value":"13"}]
13:34:02 INFO - TEST-START | /XMLHttpRequest/open-url-base-inserted-after-open.htm
13:34:02 INFO - PROCESS | 1608 | 1483652042741 Marionette TRACE conn5 -> [0,318,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:34:02 INFO - PROCESS | 1608 | 1483652042875 Marionette TRACE conn5 <- [1,318,null,{"value":null}]
13:34:02 INFO - PROCESS | 1608 | 1483652042920 Marionette TRACE conn5 -> [0,319,"getWindowHandles",null]
13:34:02 INFO - PROCESS | 1608 | 1483652042923 Marionette TRACE conn5 <- [1,319,null,["13"]]
13:34:02 INFO - PROCESS | 1608 | 1483652042926 Marionette TRACE conn5 -> [0,320,"switchToWindow",{"name":"13"}]
13:34:02 INFO - PROCESS | 1608 | 1483652042930 Marionette TRACE conn5 <- [1,320,null,{}]
13:34:02 INFO - PROCESS | 1608 | 1483652042936 Marionette TRACE conn5 -> [0,321,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-base-inserted-after-open.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-base-inserted-after-open.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:34:02 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CEABF000 == 46 [pid = 1608] [id = 74]
13:34:02 INFO - PROCESS | 1608 | ++DOMWINDOW == 102 (000000E3CEABF800) [pid = 1608] [serial = 218] [outer = 0000000000000000]
13:34:02 INFO - PROCESS | 1608 | ++DOMWINDOW == 103 (000000E3CEAC3800) [pid = 1608] [serial = 219] [outer = 000000E3CEABF800]
13:34:02 INFO - PROCESS | 1608 | 1483652042991 Marionette DEBUG loaded listener.js
13:34:03 INFO - PROCESS | 1608 | ++DOMWINDOW == 104 (000000E3CEACC800) [pid = 1608] [serial = 220] [outer = 000000E3CEABF800]
13:34:03 INFO - PROCESS | 1608 | 1483652043283 Marionette TRACE conn5 <- [1,321,null,{"value":["/XMLHttpRequest/open-url-base-inserted-after-open.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - insert after open()",0,null,null]]]}]
13:34:03 INFO - .
13:34:03 INFO - TEST-OK | /XMLHttpRequest/open-url-base-inserted-after-open.htm | took 567ms
13:34:03 INFO - PROCESS | 1608 | 1483652043310 Marionette TRACE conn5 -> [0,322,"getWindowHandle",null]
13:34:03 INFO - PROCESS | 1608 | 1483652043312 Marionette TRACE conn5 <- [1,322,null,{"value":"13"}]
13:34:03 INFO - TEST-START | /XMLHttpRequest/open-url-base-inserted.htm
13:34:03 INFO - PROCESS | 1608 | 1483652043316 Marionette TRACE conn5 -> [0,323,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:34:03 INFO - PROCESS | 1608 | 1483652043441 Marionette TRACE conn5 <- [1,323,null,{"value":null}]
13:34:03 INFO - PROCESS | 1608 | 1483652043449 Marionette TRACE conn5 -> [0,324,"getWindowHandles",null]
13:34:03 INFO - PROCESS | 1608 | 1483652043451 Marionette TRACE conn5 <- [1,324,null,["13"]]
13:34:03 INFO - PROCESS | 1608 | 1483652043454 Marionette TRACE conn5 -> [0,325,"switchToWindow",{"name":"13"}]
13:34:03 INFO - PROCESS | 1608 | 1483652043457 Marionette TRACE conn5 <- [1,325,null,{}]
13:34:03 INFO - PROCESS | 1608 | 1483652043462 Marionette TRACE conn5 -> [0,326,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-base-inserted.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-base-inserted.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:34:03 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CB70F000 == 47 [pid = 1608] [id = 75]
13:34:03 INFO - PROCESS | 1608 | ++DOMWINDOW == 105 (000000E3CDFF1000) [pid = 1608] [serial = 221] [outer = 0000000000000000]
13:34:03 INFO - PROCESS | 1608 | ++DOMWINDOW == 106 (000000E3CE131800) [pid = 1608] [serial = 222] [outer = 000000E3CDFF1000]
13:34:03 INFO - PROCESS | 1608 | 1483652043521 Marionette DEBUG loaded listener.js
13:34:03 INFO - PROCESS | 1608 | ++DOMWINDOW == 107 (000000E3CE13A800) [pid = 1608] [serial = 223] [outer = 000000E3CDFF1000]
13:34:03 INFO - PROCESS | 1608 | 1483652043866 Marionette TRACE conn5 <- [1,326,null,{"value":["/XMLHttpRequest/open-url-base-inserted.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - insert ",0,null,null]]]}]
13:34:03 INFO - .
13:34:03 INFO - TEST-OK | /XMLHttpRequest/open-url-base-inserted.htm | took 586ms
13:34:03 INFO - PROCESS | 1608 | 1483652043905 Marionette TRACE conn5 -> [0,327,"getWindowHandle",null]
13:34:03 INFO - PROCESS | 1608 | 1483652043908 Marionette TRACE conn5 <- [1,327,null,{"value":"13"}]
13:34:03 INFO - TEST-START | /XMLHttpRequest/open-url-base.htm
13:34:03 INFO - PROCESS | 1608 | 1483652043912 Marionette TRACE conn5 -> [0,328,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:34:04 INFO - PROCESS | 1608 | 1483652044048 Marionette TRACE conn5 <- [1,328,null,{"value":null}]
13:34:04 INFO - PROCESS | 1608 | 1483652044089 Marionette TRACE conn5 -> [0,329,"getWindowHandles",null]
13:34:04 INFO - PROCESS | 1608 | 1483652044091 Marionette TRACE conn5 <- [1,329,null,["13"]]
13:34:04 INFO - PROCESS | 1608 | 1483652044094 Marionette TRACE conn5 -> [0,330,"switchToWindow",{"name":"13"}]
13:34:04 INFO - PROCESS | 1608 | 1483652044099 Marionette TRACE conn5 <- [1,330,null,{}]
13:34:04 INFO - PROCESS | 1608 | 1483652044102 Marionette TRACE conn5 -> [0,331,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-base.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-base.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:34:04 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CF146800 == 48 [pid = 1608] [id = 76]
13:34:04 INFO - PROCESS | 1608 | ++DOMWINDOW == 108 (000000E3CF147000) [pid = 1608] [serial = 224] [outer = 0000000000000000]
13:34:04 INFO - PROCESS | 1608 | ++DOMWINDOW == 109 (000000E3CF14E800) [pid = 1608] [serial = 225] [outer = 000000E3CF147000]
13:34:04 INFO - PROCESS | 1608 | 1483652044158 Marionette DEBUG loaded listener.js
13:34:04 INFO - PROCESS | 1608 | ++DOMWINDOW == 110 (000000E3CF153800) [pid = 1608] [serial = 226] [outer = 000000E3CF147000]
13:34:04 INFO - PROCESS | 1608 | 1483652044452 Marionette TRACE conn5 <- [1,331,null,{"value":["/XMLHttpRequest/open-url-base.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - ",0,null,null]]]}]
13:34:04 INFO - .
13:34:04 INFO - TEST-OK | /XMLHttpRequest/open-url-base.htm | took 587ms
13:34:04 INFO - PROCESS | 1608 | 1483652044502 Marionette TRACE conn5 -> [0,332,"getWindowHandle",null]
13:34:04 INFO - PROCESS | 1608 | 1483652044504 Marionette TRACE conn5 <- [1,332,null,{"value":"13"}]
13:34:04 INFO - TEST-START | /XMLHttpRequest/open-url-bogus.htm
13:34:04 INFO - PROCESS | 1608 | 1483652044509 Marionette TRACE conn5 -> [0,333,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:34:04 INFO - PROCESS | 1608 | 1483652044638 Marionette TRACE conn5 <- [1,333,null,{"value":null}]
13:34:04 INFO - PROCESS | 1608 | 1483652044750 Marionette TRACE conn5 -> [0,334,"getWindowHandles",null]
13:34:04 INFO - PROCESS | 1608 | 1483652044756 Marionette TRACE conn5 <- [1,334,null,["13"]]
13:34:04 INFO - PROCESS | 1608 | 1483652044764 Marionette TRACE conn5 -> [0,335,"switchToWindow",{"name":"13"}]
13:34:04 INFO - PROCESS | 1608 | 1483652044773 Marionette TRACE conn5 <- [1,335,null,{}]
13:34:04 INFO - PROCESS | 1608 | 1483652044780 Marionette TRACE conn5 -> [0,336,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-bogus.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:34:04 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3B9E4A800 == 49 [pid = 1608] [id = 77]
13:34:04 INFO - PROCESS | 1608 | ++DOMWINDOW == 111 (000000E3B9E4B000) [pid = 1608] [serial = 227] [outer = 0000000000000000]
13:34:04 INFO - PROCESS | 1608 | ++DOMWINDOW == 112 (000000E3B9E52800) [pid = 1608] [serial = 228] [outer = 000000E3B9E4B000]
13:34:04 INFO - PROCESS | 1608 | 1483652044859 Marionette DEBUG loaded listener.js
13:34:04 INFO - PROCESS | 1608 | ++DOMWINDOW == 113 (000000E3B9E57800) [pid = 1608] [serial = 229] [outer = 000000E3B9E4B000]
13:34:05 INFO - PROCESS | 1608 | [1608] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x804B000A: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/netwerk/base/nsIOService.cpp, line 779
13:34:05 INFO - PROCESS | 1608 | [1608] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x804B000A: file c:\builds\moz2_slave\m-aurora-w64-d-000000000000000\build\src\netwerk\base\nsNetUtilInlines.h, line 180
13:34:05 INFO - PROCESS | 1608 | [1608] WARNING: NS_ENSURE_SUCCESS(rv, rv) failed with result 0x804B000A: file c:/builds/moz2_slave/m-aurora-w64-d-000000000000000/build/src/dom/xhr/XMLHttpRequestMainThread.cpp, line 2474
13:34:05 INFO - PROCESS | 1608 | 1483652045329 Marionette TRACE conn5 <- [1,336,null,{"value":["/XMLHttpRequest/open-url-bogus.htm",0,null,null,[["XMLHttpRequest: open() - bogus URLs (//[)",0,null,null],["XMLHttpRequest: open() - bogus URLs (ftp:)",1,"assert_throws: function \"function () { client.open(\"GET\", url) }\" did not throw","url/<@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:15:11\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nurl@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:13:9\n@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:19:7\n"],["XMLHttpRequest: open() - bogus URLs (http://a a/)",0,null,null],["XMLHttpRequest: open() - bogus URLs (http:////////////)",1,"assert_throws: function \"function () { client.open(\"GET\", url) }\" did not throw","url/<@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:15:11\nTest.prototype.step@http://web-platform.test:8000/resources/testharness.js:1401:20\ntest@http://web-platform.test:8000/resources/testharness.js:501:9\nurl@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:13:9\n@http://web-platform.test:8000/XMLHttpRequest/open-url-bogus.htm:21:7\n"],["XMLHttpRequest: open() - bogus URLs (http://u:p@/)",0,null,null]]]}]
13:34:05 INFO - .....
13:34:05 INFO - TEST-OK | /XMLHttpRequest/open-url-bogus.htm | took 882ms
13:34:05 INFO - PROCESS | 1608 | 1483652045394 Marionette TRACE conn5 -> [0,337,"getWindowHandle",null]
13:34:05 INFO - PROCESS | 1608 | 1483652045402 Marionette TRACE conn5 <- [1,337,null,{"value":"13"}]
13:34:05 INFO - TEST-START | /XMLHttpRequest/open-url-encoding.htm
13:34:05 INFO - PROCESS | 1608 | 1483652045454 Marionette TRACE conn5 -> [0,338,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:34:05 INFO - PROCESS | 1608 | 1483652045594 Marionette TRACE conn5 <- [1,338,null,{"value":null}]
13:34:05 INFO - PROCESS | 1608 | 1483652045678 Marionette TRACE conn5 -> [0,339,"getWindowHandles",null]
13:34:05 INFO - PROCESS | 1608 | 1483652045682 Marionette TRACE conn5 <- [1,339,null,["13"]]
13:34:05 INFO - PROCESS | 1608 | 1483652045686 Marionette TRACE conn5 -> [0,340,"switchToWindow",{"name":"13"}]
13:34:05 INFO - PROCESS | 1608 | 1483652045691 Marionette TRACE conn5 <- [1,340,null,{}]
13:34:05 INFO - PROCESS | 1608 | 1483652045696 Marionette TRACE conn5 -> [0,341,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-encoding.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-encoding.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:34:05 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C09AA000 == 50 [pid = 1608] [id = 78]
13:34:05 INFO - PROCESS | 1608 | ++DOMWINDOW == 114 (000000E3C09B4800) [pid = 1608] [serial = 230] [outer = 0000000000000000]
13:34:05 INFO - PROCESS | 1608 | ++DOMWINDOW == 115 (000000E3C2655000) [pid = 1608] [serial = 231] [outer = 000000E3C09B4800]
13:34:05 INFO - PROCESS | 1608 | 1483652045781 Marionette DEBUG loaded listener.js
13:34:05 INFO - PROCESS | 1608 | ++DOMWINDOW == 116 (000000E3C5FB0800) [pid = 1608] [serial = 232] [outer = 000000E3C09B4800]
13:34:06 INFO - PROCESS | 1608 | [1608] WARNING: String ending in half a surrogate pair!: file c:\builds\moz2_slave\m-aurora-w64-d-000000000000000\build\src\xpcom\string\nsUTF8Utils.h, line 594
13:34:06 INFO - PROCESS | 1608 | [1608] WARNING: String ending in half a surrogate pair!: file c:\builds\moz2_slave\m-aurora-w64-d-000000000000000\build\src\xpcom\string\nsUTF8Utils.h, line 495
13:34:06 INFO - PROCESS | 1608 | 1483652046208 Marionette TRACE conn5 <- [1,341,null,{"value":["/XMLHttpRequest/open-url-encoding.htm",0,null,null,[["percent encode characters",0,null,null],["lone surrogate should return U+FFFD",0,null,null]]]}]
13:34:06 INFO - ..
13:34:06 INFO - TEST-OK | /XMLHttpRequest/open-url-encoding.htm | took 777ms
13:34:06 INFO - PROCESS | 1608 | 1483652046234 Marionette TRACE conn5 -> [0,342,"getWindowHandle",null]
13:34:06 INFO - PROCESS | 1608 | 1483652046237 Marionette TRACE conn5 <- [1,342,null,{"value":"13"}]
13:34:06 INFO - TEST-START | /XMLHttpRequest/open-url-fragment.htm
13:34:06 INFO - PROCESS | 1608 | 1483652046242 Marionette TRACE conn5 -> [0,343,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:34:06 INFO - PROCESS | 1608 | 1483652046374 Marionette TRACE conn5 <- [1,343,null,{"value":null}]
13:34:06 INFO - PROCESS | 1608 | 1483652046499 Marionette TRACE conn5 -> [0,344,"getWindowHandles",null]
13:34:06 INFO - PROCESS | 1608 | 1483652046506 Marionette TRACE conn5 <- [1,344,null,["13"]]
13:34:06 INFO - PROCESS | 1608 | 1483652046513 Marionette TRACE conn5 -> [0,345,"switchToWindow",{"name":"13"}]
13:34:06 INFO - PROCESS | 1608 | 1483652046519 Marionette TRACE conn5 <- [1,345,null,{}]
13:34:06 INFO - PROCESS | 1608 | 1483652046523 Marionette TRACE conn5 -> [0,346,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-fragment.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-fragment.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:34:06 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C7DD1000 == 51 [pid = 1608] [id = 79]
13:34:06 INFO - PROCESS | 1608 | ++DOMWINDOW == 117 (000000E3C7DD6800) [pid = 1608] [serial = 233] [outer = 0000000000000000]
13:34:06 INFO - PROCESS | 1608 | ++DOMWINDOW == 118 (000000E3C89CA000) [pid = 1608] [serial = 234] [outer = 000000E3C7DD6800]
13:34:06 INFO - PROCESS | 1608 | 1483652046592 Marionette DEBUG loaded listener.js
13:34:06 INFO - PROCESS | 1608 | ++DOMWINDOW == 119 (000000E3C95B3000) [pid = 1608] [serial = 235] [outer = 000000E3C7DD6800]
13:34:07 INFO - PROCESS | 1608 | 1483652047041 Marionette TRACE conn5 <- [1,346,null,{"value":["/XMLHttpRequest/open-url-fragment.htm",0,null,null,[["XMLHttpRequest: open() resolving URLs - fragment identifier",0,null,null],["make sure fragment is removed from URL before request",0,null,null],["make sure fragment is removed from URL before request (with query string)",0,null,null],["make sure escaped # is not removed",0,null,null]]]}]
13:34:07 INFO - ....
13:34:07 INFO - TEST-OK | /XMLHttpRequest/open-url-fragment.htm | took 840ms
13:34:07 INFO - PROCESS | 1608 | 1483652047082 Marionette TRACE conn5 -> [0,347,"getWindowHandle",null]
13:34:07 INFO - TEST-START | /XMLHttpRequest/open-url-javascript-window-2.htm
13:34:07 INFO - PROCESS | 1608 | 1483652047085 Marionette TRACE conn5 <- [1,347,null,{"value":"13"}]
13:34:07 INFO - PROCESS | 1608 | 1483652047090 Marionette TRACE conn5 -> [0,348,"executeScript",{"scriptTimeout":null,"newSandbox":true,"args":[],"filename":"executormarionette.py","script":"if (window.wrappedJSObject.win) {window.wrappedJSObject.win.close()}","sandbox":"default","line":432}]
13:34:07 INFO - PROCESS | 1608 | 1483652047257 Marionette TRACE conn5 <- [1,348,null,{"value":null}]
13:34:07 INFO - PROCESS | 1608 | 1483652047367 Marionette TRACE conn5 -> [0,349,"getWindowHandles",null]
13:34:07 INFO - PROCESS | 1608 | 1483652047370 Marionette TRACE conn5 <- [1,349,null,["13"]]
13:34:07 INFO - PROCESS | 1608 | 1483652047375 Marionette TRACE conn5 -> [0,350,"switchToWindow",{"name":"13"}]
13:34:07 INFO - PROCESS | 1608 | 1483652047380 Marionette TRACE conn5 <- [1,350,null,{}]
13:34:07 INFO - PROCESS | 1608 | 1483652047387 Marionette TRACE conn5 -> [0,351,"executeAsyncScript",{"scriptTimeout":null,"sandbox":"default","debug_script":false,"script":"/* This Source Code Form is subject to the terms of the Mozilla Public\n * License, v. 2.0. If a copy of the MPL was not distributed with this\n * file, You can obtain one at http://mozilla.org/MPL/2.0/. */\n\nwindow.wrappedJSObject.timeout_multiplier = 3;\nwindow.wrappedJSObject.explicit_timeout = 0;\n\nwindow.wrappedJSObject.addEventListener(\"message\", function listener(event) {\n if (event.data.type != \"complete\") {\n return;\n }\n window.wrappedJSObject.removeEventListener(\"message\", listener);\n clearTimeout(timer);\n var tests = event.data.tests;\n var status = event.data.status;\n\n var subtest_results = tests.map(function (x) {\n return [x.name, x.status, x.message, x.stack]\n });\n\n marionetteScriptFinished([\"/XMLHttpRequest/open-url-javascript-window-2.htm\",\n status.status,\n status.message,\n status.stack,\n subtest_results]);\n}, false);\n\nwindow.wrappedJSObject.win = window.open(\"http://web-platform.test:8000/XMLHttpRequest/open-url-javascript-window-2.htm\", \"9c5fb24a-627c-4547-9a1d-d0bed33fca71\");\n\nvar timer = null;\nif (30000) {\n timer = setTimeout(function() {\n log(\"Timeout fired\");\n window.wrappedJSObject.win.timeout();\n }, 30000);\n}\n","newSandbox":false,"line":447,"args":[],"filename":"executormarionette.py"}]
13:34:07 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3CEA5F800 == 52 [pid = 1608] [id = 80]
13:34:07 INFO - PROCESS | 1608 | ++DOMWINDOW == 120 (000000E3CEA61800) [pid = 1608] [serial = 236] [outer = 0000000000000000]
13:34:07 INFO - PROCESS | 1608 | ++DOMWINDOW == 121 (000000E3CEAD4000) [pid = 1608] [serial = 237] [outer = 000000E3CEA61800]
13:34:07 INFO - PROCESS | 1608 | 1483652047455 Marionette DEBUG loaded listener.js
13:34:07 INFO - PROCESS | 1608 | ++DOMWINDOW == 122 (000000E3CEDA3000) [pid = 1608] [serial = 238] [outer = 000000E3CEA61800]
13:34:07 INFO - PROCESS | 1608 | ++DOCSHELL 000000E3C90A8800 == 53 [pid = 1608] [id = 81]
13:34:07 INFO - PROCESS | 1608 | ++DOMWINDOW == 123 (000000E3C90AD000) [pid = 1608] [serial = 239] [outer = 0000000000000000]
13:34:07 INFO - PROCESS | 1608 | ++DOMWINDOW == 124 (000000E3C90AD800) [pid = 1608] [serial = 240] [outer = 000000E3C90AD000]
13:34:07 INFO - PROCESS | 1608 | 1483652047968 Marionette TRACE conn5 <- [1,351,null,{"value":["/XMLHttpRequest/open-url-javascript-window-2.htm",0,null,null,[["XMLHttpRequest: open() - resolving URLs (javascript: