2020-04-17 13:00:42 export USER=root 2020-04-17 13:00:42 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2020-04-17 13:03:42 ./start.sh 2020-04-17 13:03:43 ./run-tests.py mbo_wnm_token_wrap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_wnm_token_wrap 1/1 Test: MBO WNM token wrap around Starting AP wlan3 Connect STA wlan0 to AP PASS mbo_wnm_token_wrap 0.718947 2020-04-17 13:03:46.440583 passed all 1 test case(s) 2020-04-17 13:03:46 ./run-tests.py mesh_add_interface_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_add_interface_oom 1/1 Test: wpa_supplicant mesh with dynamic interface addition failing PASS mesh_add_interface_oom 0.146594 2020-04-17 13:03:47.020796 passed all 1 test case(s) 2020-04-17 13:03:47 ./run-tests.py mesh_cnf_rcvd_event_cls_acpt DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_cnf_rcvd_event_cls_acpt 1/1 Test: Mesh peering management protocol testing - CLS_ACPT event in CNF_RCVD PASS mesh_cnf_rcvd_event_cls_acpt 1.034463 2020-04-17 13:03:48.480243 passed all 1 test case(s) 2020-04-17 13:03:48 ./run-tests.py mesh_default_beacon_int DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_default_beacon_int 1/1 Test: Mesh and default beacon interval PASS mesh_default_beacon_int 0.294702 2020-04-17 13:03:49.210276 passed all 1 test case(s) 2020-04-17 13:03:49 ./run-tests.py mesh_drv_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_drv_fail 1/1 Test: Mesh network setup failing due to driver command failure PASS mesh_drv_fail 0.345668 2020-04-17 13:03:50.001816 passed all 1 test case(s) 2020-04-17 13:03:50 ./run-tests.py mesh_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_failure 1/1 Test: Mesh and local failures PASS mesh_failure 3.228989 2020-04-17 13:03:53.672790 passed all 1 test case(s) 2020-04-17 13:03:53 ./run-tests.py mesh_forwarding DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_forwarding 1/1 Test: Mesh with two stations that can't reach each other directly PASS mesh_forwarding 1.728152 2020-04-17 13:03:55.900740 passed all 1 test case(s) 2020-04-17 13:03:55 ./run-tests.py mesh_forwarding_secure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_forwarding_secure 1/1 Test: Mesh with two stations that can't reach each other directly (RSN) PASS mesh_forwarding_secure 1.60261 2020-04-17 13:03:57.971619 passed all 1 test case(s) 2020-04-17 13:03:58 ./run-tests.py mesh_holding DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_holding 1/1 Test: Mesh MPM FSM and HOLDING state event OPN_ACPT PASS mesh_holding 1.486258 2020-04-17 13:03:59.877585 passed all 1 test case(s) 2020-04-17 13:03:59 ./run-tests.py mesh_invalid_frequency DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_invalid_frequency 1/1 Test: Mesh and invalid frequency configuration PASS mesh_invalid_frequency 0.101678 2020-04-17 13:04:00.467347 passed all 1 test case(s) 2020-04-17 13:04:00 ./run-tests.py mesh_link_probe DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_link_probe 1/1 Test: Mesh link probing PASS mesh_link_probe 2.195557 2020-04-17 13:04:03.153594 passed all 1 test case(s) 2020-04-17 13:04:03 ./run-tests.py mesh_missing_mic DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_missing_mic 1/1 Test: Secure mesh network and missing MIC Found MIC at 197 PASS mesh_missing_mic 1.378586 2020-04-17 13:04:04.976762 passed all 1 test case(s) 2020-04-17 13:04:05 ./run-tests.py mesh_mpm_init_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_mpm_init_proto 1/1 Test: Mesh peering management protocol testing for peer addition PASS mesh_mpm_init_proto 0.316242 2020-04-17 13:04:05.757270 passed all 1 test case(s) 2020-04-17 13:04:05 ./run-tests.py mesh_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_oom 1/1 Test: Mesh network setup failing due to OOM Test instance 1 Test instance 2 Test instance 3 Test instance 4 Test instance 5 Test instance 6 Test instance 7 Test instance 8 Test instance 9 Test instance 10 Test instance 11 Test instance 12 Test instance 13 Test instance 14 Test instance 15 Test instance 16 Test instance 17 Test instance 18 Test instance 19 Test instance 20 Test instance 21 Test instance 22 Test instance 23 Test instance 24 Test instance 25 Test instance 26 Test instance 27 Test instance 28 Test instance 29 Test instance 30 Test instance 31 Test instance 32 Test instance 33 Test instance 34 Test instance 35 Test instance 36 Test instance 37 Test instance 38 Test instance 39 Test instance 40 Test instance 41 Test instance 42 Test instance 43 Test instance 44 Test instance 45 Test instance 46 Test instance 47 Test instance 48 Test instance 49 Test instance 50 Test instance 51 Test instance 52 Test instance 53 Test instance 54 Test instance 55 Test instance 56 Test instance 57 Test instance 58 Test instance 59 Test instance 60 Test instance 61 Test instance 62 Test instance 63 Test instance 64 Test instance 65 PASS mesh_oom 18.972497 2020-04-17 13:04:25.196366 passed all 1 test case(s) 2020-04-17 13:04:25 ./run-tests.py mesh_open_no_auto2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_open_no_auto2 1/1 Test: Open mesh network connectivity, no_auto on both peers PASS mesh_open_no_auto2 0.778255 2020-04-17 13:04:26.459460 passed all 1 test case(s) 2020-04-17 13:04:26 ./run-tests.py mesh_open_rssi_threshold DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_open_rssi_threshold 1/1 Test: Open mesh network with RSSI threshold PASS mesh_open_rssi_threshold 0.684188 2020-04-17 13:04:27.573785 passed all 1 test case(s) 2020-04-17 13:04:27 ./run-tests.py mesh_open_vht_160 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_open_vht_160 1/1 Test: Open mesh network on VHT 160 MHz channel PASS mesh_open_vht_160 1.677204 2020-04-17 13:04:29.699519 passed all 1 test case(s) 2020-04-17 13:04:29 ./run-tests.py mesh_opn_snt_event_cls_acpt DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_opn_snt_event_cls_acpt 1/1 Test: Mesh peering management protocol testing - CLS_ACPT event in OPN_SNT PASS mesh_opn_snt_event_cls_acpt 1.359653 2020-04-17 13:04:31.523902 passed all 1 test case(s) 2020-04-17 13:04:31 ./run-tests.py mesh_peering_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_peering_proto 1/1 Test: Mesh peering management protocol testing Found Mesh Peering Management element at 69 Found Mesh ID element at 44 Found Mesh ID element at 44 Found Mesh Peering Management element at 69 PASS mesh_peering_proto 1.084902 2020-04-17 13:04:33.074989 passed all 1 test case(s) 2020-04-17 13:04:33 ./run-tests.py mesh_pmkid_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_pmkid_mismatch 1/1 Test: Secure mesh network and PMKID mismatch Found Mesh Peering Management element at 90 PASS mesh_pmkid_mismatch 2.110797 2020-04-17 13:04:35.663837 passed all 1 test case(s) 2020-04-17 13:04:35 ./run-tests.py mesh_pmksa_caching_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_pmksa_caching_oom 1/1 Test: Secure mesh network and PMKSA caching failing due to OOM PASS mesh_pmksa_caching_oom 1.525634 2020-04-17 13:04:37.646201 passed all 1 test case(s) 2020-04-17 13:04:37 ./run-tests.py mesh_sae_anti_clogging DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_sae_anti_clogging 1/1 Test: Mesh using SAE and anti-clogging PASS mesh_sae_anti_clogging 1.940016 2020-04-17 13:04:40.025410 passed all 1 test case(s) 2020-04-17 13:04:40 ./run-tests.py mesh_sae_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_sae_failure 1/1 Test: Mesh and local SAE failures PASS mesh_sae_failure 9.476368 2020-04-17 13:04:49.978951 passed all 1 test case(s) 2020-04-17 13:04:50 ./run-tests.py mesh_sae_groups_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_sae_groups_invalid 1/1 Test: Mesh with invalid SAE group configuration PASS mesh_sae_groups_invalid 2.681217 2020-04-17 13:04:53.087662 passed all 1 test case(s) 2020-04-17 13:04:53 ./run-tests.py mesh_scan_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_scan_oom 1/1 Test: wpa_supplicant mesh scan results and OOM PASS mesh_scan_oom 0.351122 2020-04-17 13:04:53.856383 passed all 1 test case(s) 2020-04-17 13:04:53 ./run-tests.py mesh_scan_parse_error DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_scan_parse_error 1/1 Test: Mesh scan element parse error Starting AP wlan3 PASS mesh_scan_parse_error 0.341417 2020-04-17 13:04:54.604626 passed all 1 test case(s) 2020-04-17 13:04:54 ./run-tests.py mesh_secure_ccmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_ccmp 1/1 Test: Secure mesh with CCMP PASS mesh_secure_ccmp 1.119226 2020-04-17 13:04:56.149129 passed all 1 test case(s) 2020-04-17 13:04:56 ./run-tests.py mesh_secure_ccmp_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_ccmp_256 1/1 Test: Secure mesh with CCMP-256 PASS mesh_secure_ccmp_256 1.63389 2020-04-17 13:04:58.240661 passed all 1 test case(s) 2020-04-17 13:04:58 ./run-tests.py mesh_secure_ccmp_256_cmac_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_ccmp_256_cmac_256 1/1 Test: Secure mesh with CCMP-256 and BIP-CMAC-256 PASS mesh_secure_ccmp_256_cmac_256 0.613277 2020-04-17 13:04:59.257743 passed all 1 test case(s) 2020-04-17 13:04:59 ./run-tests.py mesh_secure_ccmp_cmac DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_ccmp_cmac 1/1 Test: Secure mesh with CCMP-128 and BIP-CMAC-128 PASS mesh_secure_ccmp_cmac 1.571727 2020-04-17 13:05:01.267019 passed all 1 test case(s) 2020-04-17 13:05:01 ./run-tests.py mesh_secure_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_fail 1/1 Test: Secure mesh network connectivity failure PASS mesh_secure_fail 0.605787 2020-04-17 13:05:02.314333 passed all 1 test case(s) 2020-04-17 13:05:02 ./run-tests.py mesh_secure_gcmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_gcmp 1/1 Test: Secure mesh with GCMP PASS mesh_secure_gcmp 0.537589 2020-04-17 13:05:03.267020 passed all 1 test case(s) 2020-04-17 13:05:03 ./run-tests.py mesh_secure_gcmp_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_gcmp_256 1/1 Test: Secure mesh with GCMP-256 PASS mesh_secure_gcmp_256 0.657516 2020-04-17 13:05:04.321859 passed all 1 test case(s) 2020-04-17 13:05:04 ./run-tests.py mesh_secure_gcmp_256_gmac_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_gcmp_256_gmac_256 1/1 Test: Secure mesh with GCMP-256 and BIP-GMAC-256 PASS mesh_secure_gcmp_256_gmac_256 0.593355 2020-04-17 13:05:05.346352 passed all 1 test case(s) 2020-04-17 13:05:05 ./run-tests.py mesh_secure_gcmp_gmac DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_gcmp_gmac 1/1 Test: Secure mesh with GCMP-128 and BIP-GMAC-128 PASS mesh_secure_gcmp_gmac 0.540628 2020-04-17 13:05:06.377006 passed all 1 test case(s) 2020-04-17 13:05:06 ./run-tests.py mesh_secure_invalid_group_cipher DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_invalid_group_cipher 1/1 Test: Secure mesh and invalid group cipher PASS mesh_secure_invalid_group_cipher 0.094745 2020-04-17 13:05:06.876552 passed all 1 test case(s) 2020-04-17 13:05:06 ./run-tests.py mesh_secure_invalid_pairwise_cipher DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_invalid_pairwise_cipher 1/1 Test: Secure mesh and invalid group cipher PASS mesh_secure_invalid_pairwise_cipher 0.109944 2020-04-17 13:05:07.406968 passed all 1 test case(s) 2020-04-17 13:05:07 ./run-tests.py mesh_secure_ocv DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_ocv 1/1 Test: Secure mesh network connectivity with OCV enabled PASS mesh_secure_ocv 0.578502 2020-04-17 13:05:08.395873 passed all 1 test case(s) 2020-04-17 13:05:08 ./run-tests.py mesh_secure_ocv_compat DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_ocv_compat 1/1 Test: Secure mesh network where only one peer has OCV enabled PASS mesh_secure_ocv_compat 0.594899 2020-04-17 13:05:09.443328 passed all 1 test case(s) 2020-04-17 13:05:09 ./run-tests.py mesh_secure_ocv_mix_ht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_ocv_mix_ht 1/1 Test: Mesh network with a VHT STA and a HT STA under OCV PASS mesh_secure_ocv_mix_ht 0.831466 2020-04-17 13:05:10.699109 passed all 1 test case(s) 2020-04-17 13:05:10 ./run-tests.py mesh_secure_ocv_mix_legacy DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_ocv_mix_legacy 1/1 Test: Mesh network with a VHT STA and a legacy STA under OCV PASS mesh_secure_ocv_mix_legacy 1.613428 2020-04-17 13:05:12.775868 passed all 1 test case(s) 2020-04-17 13:05:12 ./run-tests.py mesh_secure_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_pmf 1/1 Test: Secure mesh network connectivity with PMF enabled PASS mesh_secure_pmf 1.360081 2020-04-17 13:05:14.565856 passed all 1 test case(s) 2020-04-17 13:05:14 ./run-tests.py mesh_select_network DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_select_network 1/1 Test: Mesh network and SELECT_NETWORK PASS mesh_select_network 0.569365 2020-04-17 13:05:15.566557 passed all 1 test case(s) 2020-04-17 13:05:15 ./run-tests.py mesh_wpa_auth_init_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_wpa_auth_init_oom 1/1 Test: Secure mesh network setup failing due to wpa_init() OOM PASS mesh_wpa_auth_init_oom 0.337894 2020-04-17 13:05:16.370447 passed all 1 test case(s) 2020-04-17 13:05:16 ./run-tests.py mesh_wpa_init_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_wpa_init_fail 1/1 Test: Secure mesh network setup local failure PASS mesh_wpa_init_fail 2.400847 2020-04-17 13:05:19.219892 passed all 1 test case(s) 2020-04-17 13:05:19 ./run-tests.py module_hostapd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START module_hostapd 1/1 Test: hostapd module tests PASS module_hostapd 0.073526 2020-04-17 13:05:19.720960 passed all 1 test case(s) 2020-04-17 13:05:19 ./run-tests.py module_wpa_supplicant DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START module_wpa_supplicant 1/1 Test: wpa_supplicant module tests PASS module_wpa_supplicant 1.928607 2020-04-17 13:05:22.085716 passed all 1 test case(s) 2020-04-17 13:05:22 ./run-tests.py monitor_iface_multi_bss DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START monitor_iface_multi_bss 1/1 Test: AP mode mmonitor interface with hostapd multi-BSS setup Starting AP wlan3 Starting BSS phy=phy3 ifname=wlan3-2 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS monitor_iface_multi_bss 0.949969 2020-04-17 13:05:23.512618 passed all 1 test case(s) 2020-04-17 13:05:23 ./run-tests.py monitor_iface_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START monitor_iface_open 1/1 Test: Open connection using cfg80211 monitor interface on AP Connect STA wlan0 to AP PASS monitor_iface_open 4.59343 2020-04-17 13:05:28.564239 passed all 1 test case(s) 2020-04-17 13:05:28 ./run-tests.py monitor_iface_unknown_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START monitor_iface_unknown_sta 1/1 Test: AP mode monitor interface and Data frame from unknown STA Starting AP wlan3 Connect STA wlan0 to AP No disconnection Traceback (most recent call last): File "./run-tests.py", line 521, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_monitor_interface.py", line 80, in test_monitor_iface_unknown_sta raise Exception("No disconnection") Exception: No disconnection FAIL monitor_iface_unknown_sta 5.544894 2020-04-17 13:05:34.527273 passed 0 test case(s) skipped 0 test case(s) failed tests: monitor_iface_unknown_sta 2020-04-17 13:05:34 ./run-tests.py monitor_iface_wpa2_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START monitor_iface_wpa2_psk 1/1 Test: WPA2-PSK connection using cfg80211 monitor interface on AP Connect STA wlan0 to AP PASS monitor_iface_wpa2_psk 4.560834 2020-04-17 13:05:39.484745 passed all 1 test case(s) 2020-04-17 13:05:39 ./run-tests.py multi_ap_association DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_association 1/1 Test: Multi-AP association in backhaul BSS Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS multi_ap_association 0.690369 2020-04-17 13:05:40.572277 passed all 1 test case(s) 2020-04-17 13:05:40 ./run-tests.py multi_ap_association_shared_bss DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_association_shared_bss 1/1 Test: Multi-AP association in backhaul BSS (with fronthaul BSS enabled) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS multi_ap_association_shared_bss 0.813528 2020-04-17 13:05:41.782302 passed all 1 test case(s) 2020-04-17 13:05:41 ./run-tests.py multi_ap_disabled_on_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_disabled_on_ap 1/1 Test: Multi-AP association attempt when disabled on AP Starting AP wlan3 Connect STA wlan0 to AP PASS multi_ap_disabled_on_ap 0.521095 2020-04-17 13:05:42.727511 passed all 1 test case(s) 2020-04-17 13:05:42 ./run-tests.py multi_ap_fronthaul_on_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_fronthaul_on_ap 1/1 Test: Multi-AP association attempt when only fronthaul BSS on AP Starting AP wlan3 Connect STA wlan0 to AP PASS multi_ap_fronthaul_on_ap 0.49895 2020-04-17 13:05:43.657676 passed all 1 test case(s) 2020-04-17 13:05:43 ./run-tests.py multi_ap_wps_fail_non_multi_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_wps_fail_non_multi_ap 1/1 Test: Multi-AP WPS on non-WPS AP fails Starting AP wlan3 PASS multi_ap_wps_fail_non_multi_ap 4.774543 2020-04-17 13:05:48.850896 passed all 1 test case(s) 2020-04-17 13:05:48 ./run-tests.py multi_ap_wps_shared DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_wps_shared 1/1 Test: WPS on shared fronthaul/backhaul AP Starting AP wlan3 PASS multi_ap_wps_shared 9.05297 2020-04-17 13:05:58.297840 passed all 1 test case(s) 2020-04-17 13:05:58 ./run-tests.py multi_ap_wps_shared_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_wps_shared_psk 1/1 Test: WPS on shared fronthaul/backhaul AP using PSK Starting AP wlan3 PASS multi_ap_wps_shared_psk 9.096503 2020-04-17 13:06:07.783447 passed all 1 test case(s) 2020-04-17 13:06:07 ./run-tests.py multi_ap_wps_split DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_wps_split 1/1 Test: WPS on split fronthaul and backhaul AP Starting AP wlan4 Starting AP wlan3 PASS multi_ap_wps_split 9.343191 2020-04-17 13:06:17.581578 passed all 1 test case(s) 2020-04-17 13:06:17 ./run-tests.py multi_ap_wps_split_mixed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_wps_split_mixed 1/1 Test: WPS on split fronthaul and backhaul AP with mixed-mode fronthaul Starting AP wlan4 Starting AP wlan3 PASS multi_ap_wps_split_mixed 9.274277 2020-04-17 13:06:27.275626 passed all 1 test case(s) 2020-04-17 13:06:27 ./run-tests.py multi_ap_wps_split_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_wps_split_open 1/1 Test: WPS on split fronthaul and backhaul AP with open fronthaul Starting AP wlan4 Starting AP wlan3 PASS multi_ap_wps_split_open 11.279334 2020-04-17 13:06:38.952279 passed all 1 test case(s) 2020-04-17 13:06:39 ./run-tests.py multi_ap_wps_split_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_wps_split_psk 1/1 Test: WPS on split fronthaul and backhaul AP Starting AP wlan4 Starting AP wlan3 PASS multi_ap_wps_split_psk 9.279343 2020-04-17 13:06:48.634505 passed all 1 test case(s) 2020-04-17 13:06:48 ./run-tests.py nfc_invalid_ndef_record DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_invalid_ndef_record 1/1 Test: Invalid NFC NDEF record handling PASS nfc_invalid_ndef_record 0.0756 2020-04-17 13:06:49.136237 passed all 1 test case(s) 2020-04-17 13:06:49 ./run-tests.py nfc_p2p_both_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_both_go 1/1 Test: NFC connection handover with both devices already GOs Start autonomous GOs Perform NFC connection handover PASS nfc_p2p_both_go 0.512789 2020-04-17 13:06:50.049105 passed all 1 test case(s) 2020-04-17 13:06:50 ./run-tests.py nfc_p2p_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_client 1/1 Test: NFC connection handover when one device is P2P client Start autonomous GOs Connect one device as a P2P client wlan1: Trying to discover peer 02:00:00:00:00:00 Client connected NFC connection handover between P2P client and P2P device Connect to group based on upper layer trigger wlan2: Trying to discover peer 02:00:00:00:00:00 Client connected PASS nfc_p2p_client 2.427519 2020-04-17 13:06:52.884391 passed all 1 test case(s) 2020-04-17 13:06:52 ./run-tests.py nfc_p2p_go_legacy_config_token DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_go_legacy_config_token 1/1 Test: NFC config token from P2P GO to legacy WPS STA Start autonomous GOs Connect legacy WPS STA with configuration token PASS nfc_p2p_go_legacy_config_token 0.597859 2020-04-17 13:06:53.900142 passed all 1 test case(s) 2020-04-17 13:06:53 ./run-tests.py nfc_p2p_go_legacy_handover DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_go_legacy_handover 1/1 Test: NFC token from legacy WPS STA to P2P GO Start autonomous GOs Connect legacy WPS STA with connection handover PASS nfc_p2p_go_legacy_handover 0.761378 2020-04-17 13:06:55.094492 passed all 1 test case(s) 2020-04-17 13:06:55 ./run-tests.py nfc_p2p_go_neg DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_go_neg 1/1 Test: NFC connection handover to form a new P2P group (initiator becomes GO) Perform NFC connection handover Group formed PASS nfc_p2p_go_neg 1.211811 2020-04-17 13:06:56.738044 passed all 1 test case(s) 2020-04-17 13:06:56 ./run-tests.py nfc_p2p_go_neg_ip_pool_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_go_neg_ip_pool_oom 1/1 Test: NFC connection handover to form a new P2P group and IP pool OOM Perform NFC connection handover Group formed PASS nfc_p2p_go_neg_ip_pool_oom 1.245508 2020-04-17 13:06:58.383743 passed all 1 test case(s) 2020-04-17 13:06:58 ./run-tests.py nfc_p2p_go_neg_reverse DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_go_neg_reverse 1/1 Test: NFC connection handover to form a new P2P group (responder becomes GO) Perform NFC connection handover Group formed PASS nfc_p2p_go_neg_reverse 1.297072 2020-04-17 13:07:00.077930 passed all 1 test case(s) 2020-04-17 13:07:00 ./run-tests.py nfc_p2p_initiator_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_initiator_go 1/1 Test: NFC connection handover with initiator already GO Start autonomous GO Perform NFC connection handover PASS nfc_p2p_initiator_go 1.233986 2020-04-17 13:07:01.724228 passed all 1 test case(s) 2020-04-17 13:07:01 ./run-tests.py nfc_p2p_ip_addr_assignment DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_ip_addr_assignment 1/1 Test: NFC connection handover and legacy station IP address assignment Perform NFC connection handover Group formed Connect legacy P2P client that does not use new IP address assignment wlan2: Trying to discover peer 02:00:00:00:01:00 Client connected PASS nfc_p2p_ip_addr_assignment 9.89883 2020-04-17 13:07:12.003037 passed all 1 test case(s) 2020-04-17 13:07:12 ./run-tests.py nfc_p2p_ip_addr_assignment2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_ip_addr_assignment2 1/1 Test: NFC connection handover and IP address assignment for two clients Perform NFC connection handover Group formed Client 1 IP address: 192.168.42.100 Connect a P2P client wlan2: Trying to discover peer 02:00:00:00:01:00 Client connected Client 2 IP address: 192.168.42.101 PASS nfc_p2p_ip_addr_assignment2 9.768567 2020-04-17 13:07:22.198497 passed all 1 test case(s) 2020-04-17 13:07:22 ./run-tests.py nfc_p2p_responder_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_responder_go 1/1 Test: NFC connection handover with responder already GO Start autonomous GO Perform NFC connection handover PASS nfc_p2p_responder_go 0.959737 2020-04-17 13:07:23.571710 passed all 1 test case(s) 2020-04-17 13:07:23 ./run-tests.py nfc_p2p_static_handover_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_static_handover_invalid 1/1 Test: NFC static handover with invalid contents Unknown OOB GO Neg channel No OOB GO Neg channel attribute No Device Info attribute PASS nfc_p2p_static_handover_invalid 0.079974 2020-04-17 13:07:24.071257 passed all 1 test case(s) 2020-04-17 13:07:24 ./run-tests.py nfc_p2p_static_handover_join_tagdev_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_static_handover_join_tagdev_client 1/1 Test: NFC static handover to join a P2P group (NFC Tag device is the P2P Client) Start autonomous GO Write NFC Tag on the P2P Client Read NFC Tag on the GO to trigger invitation Write NFC Tag on another P2P Client Read NFC Tag on the GO to trigger invitation PASS nfc_p2p_static_handover_join_tagdev_client 2.031551 2020-04-17 13:07:26.547419 passed all 1 test case(s) 2020-04-17 13:07:26 ./run-tests.py nfc_p2p_static_handover_join_tagdev_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_static_handover_join_tagdev_go 1/1 Test: NFC static handover to join a P2P group (NFC Tag device is the GO) Start autonomous GO Write NFC Tag on the GO Read NFC Tag on a P2P Device to join a group Read NFC Tag on another P2P Device to join a group PASS nfc_p2p_static_handover_join_tagdev_go 2.742333 2020-04-17 13:07:29.703974 passed all 1 test case(s) 2020-04-17 13:07:29 ./run-tests.py nfc_p2p_static_handover_tagdev_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_static_handover_tagdev_client 1/1 Test: NFC static handover to form a new P2P group (NFC Tag device becomes P2P Client) Perform NFC connection handover Group formed PASS nfc_p2p_static_handover_tagdev_client 1.415547 2020-04-17 13:07:31.582505 passed all 1 test case(s) 2020-04-17 13:07:31 ./run-tests.py nfc_p2p_static_handover_tagdev_client_group_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_static_handover_tagdev_client_group_iface 1/1 Test: NFC static handover to form a new P2P group (NFC Tag device becomes P2P Client with group iface) Perform NFC connection handover Group formed PASS nfc_p2p_static_handover_tagdev_client_group_iface 1.460891 2020-04-17 13:07:33.507541 passed all 1 test case(s) 2020-04-17 13:07:33 ./run-tests.py nfc_p2p_static_handover_tagdev_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_static_handover_tagdev_go 1/1 Test: NFC static handover to form a new P2P group (NFC Tag device becomes GO) Perform NFC connection handover Group formed PASS nfc_p2p_static_handover_tagdev_go 1.490435 2020-04-17 13:07:35.461242 passed all 1 test case(s) 2020-04-17 13:07:35 ./run-tests.py nfc_p2p_static_handover_tagdev_go_forced_freq DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_static_handover_tagdev_go_forced_freq 1/1 Test: NFC static handover to form a new P2P group on forced channel (NFC Tag device becomes GO) Perform NFC connection handover Group formed PASS nfc_p2p_static_handover_tagdev_go_forced_freq 1.49735 2020-04-17 13:07:37.429197 passed all 1 test case(s) 2020-04-17 13:07:37 ./run-tests.py nfc_p2p_tag_enable_disable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_tag_enable_disable 1/1 Test: NFC tag enable/disable for P2P PASS nfc_p2p_tag_enable_disable 0.107958 2020-04-17 13:07:37.977303 passed all 1 test case(s) 2020-04-17 13:07:38 ./run-tests.py nfc_wps_config_token DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_config_token 1/1 Test: NFC tag with configuration token from AP Starting AP wlan3 NFC configuration token from AP to station PASS nfc_wps_config_token 0.612265 2020-04-17 13:07:39.047379 passed all 1 test case(s) 2020-04-17 13:07:39 ./run-tests.py nfc_wps_config_token_init DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_config_token_init 1/1 Test: NFC tag with configuration token from AP with auto configuration Starting AP wlan3 NFC configuration token from AP to station PASS nfc_wps_config_token_init 1.139045 2020-04-17 13:07:40.645520 passed all 1 test case(s) 2020-04-17 13:07:40 ./run-tests.py nfc_wps_er_config_token DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_er_config_token 1/1 Test: WPS NFC configuration token from ER to Enrollee Starting AP wlan3 Learn AP configuration Start ER Use learned network configuration on ER WPS provisioning step using configuration token from ER PASS nfc_wps_er_config_token 10.892641 2020-04-17 13:07:51.975607 passed all 1 test case(s) 2020-04-17 13:07:52 ./run-tests.py nfc_wps_er_handover DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_er_handover 1/1 Test: WPS NFC connection handover between Enrollee and ER Starting AP wlan3 Learn AP configuration Start ER Use learned network configuration on ER WPS provisioning step using connection handover PASS nfc_wps_er_handover 12.116908 2020-04-17 13:08:04.545913 passed all 1 test case(s) 2020-04-17 13:08:04 ./run-tests.py nfc_wps_er_handover_pk_hash_mismatch_er DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_er_handover_pk_hash_mismatch_er 1/1 Test: WPS NFC connection handover with invalid pkhash from ER to station (negative) Starting AP wlan3 Learn AP configuration Start ER Use learned network configuration on ER WPS provisioning step using connection handover PASS nfc_wps_er_handover_pk_hash_mismatch_er 10.856139 2020-04-17 13:08:15.814775 passed all 1 test case(s) 2020-04-17 13:08:15 ./run-tests.py nfc_wps_er_handover_pk_hash_mismatch_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_er_handover_pk_hash_mismatch_sta 1/1 Test: WPS NFC connection handover with invalid pkhash from station to ER (negative) Starting AP wlan3 Learn AP configuration Start ER Use learned network configuration on ER WPS provisioning step using connection handover PASS nfc_wps_er_handover_pk_hash_mismatch_sta 17.80771 2020-04-17 13:08:34.044325 passed all 1 test case(s) 2020-04-17 13:08:34 ./run-tests.py nfc_wps_er_pw_token DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_er_pw_token 1/1 Test: WPS NFC password token from Enrollee to ER Starting AP wlan3 Learn AP configuration Start ER Use learned network configuration on ER WPS provisioning step using password token from station PASS nfc_wps_er_pw_token 12.090729 2020-04-17 13:08:46.545794 passed all 1 test case(s) 2020-04-17 13:08:46 ./run-tests.py nfc_wps_handover DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_handover 1/1 Test: Connect to WPS AP with NFC connection handover Starting AP wlan3 NFC connection handover PASS nfc_wps_handover 0.751895 2020-04-17 13:08:47.723791 passed all 1 test case(s) 2020-04-17 13:08:47 ./run-tests.py nfc_wps_handover_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_handover_5ghz 1/1 Test: Connect to WPS AP with NFC connection handover on 5 GHz band Starting AP wlan3 NFC connection handover Country code at the end: 00 PASS nfc_wps_handover_5ghz 1.122938 2020-04-17 13:08:49.251505 passed all 1 test case(s) 2020-04-17 13:08:49 ./run-tests.py nfc_wps_handover_chan14 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_handover_chan14 1/1 Test: Connect to WPS AP with NFC connection handover on channel 14 Starting AP wlan3 NFC connection handover Country code at the end: 00 PASS nfc_wps_handover_chan14 1.043577 2020-04-17 13:08:50.683999 passed all 1 test case(s) 2020-04-17 13:08:50 ./run-tests.py nfc_wps_handover_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_handover_errors 1/1 Test: WPS AP NFC handover report error cases Starting AP wlan3 PASS nfc_wps_handover_errors 0.236248 2020-04-17 13:08:51.377259 passed all 1 test case(s) 2020-04-17 13:08:51 ./run-tests.py nfc_wps_handover_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_handover_failure 1/1 Test: Connect to WPS AP with NFC connection handover (local failure) Starting AP wlan3 NFC connection handover PASS nfc_wps_handover_failure 1.162988 2020-04-17 13:08:52.993818 passed all 1 test case(s) 2020-04-17 13:08:53 ./run-tests.py nfc_wps_handover_init DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_handover_init 1/1 Test: Connect to WPS AP with NFC connection handover and move to configured state Starting AP wlan3 NFC connection handover PASS nfc_wps_handover_init 1.354563 2020-04-17 13:08:54.775242 passed all 1 test case(s) 2020-04-17 13:08:54 ./run-tests.py nfc_wps_handover_pk_hash_mismatch_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_handover_pk_hash_mismatch_ap 1/1 Test: WPS NFC connection handover with invalid pkhash from AP (negative) Starting AP wlan3 NFC connection handover PASS nfc_wps_handover_pk_hash_mismatch_ap 0.544428 2020-04-17 13:08:55.767056 passed all 1 test case(s) 2020-04-17 13:08:55 ./run-tests.py nfc_wps_handover_pk_hash_mismatch_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_handover_pk_hash_mismatch_sta 1/1 Test: WPS NFC connection handover with invalid pkhash from station (negative) Starting AP wlan3 NFC connection handover PASS nfc_wps_handover_pk_hash_mismatch_sta 0.501079 2020-04-17 13:08:56.671183 passed all 1 test case(s) 2020-04-17 13:08:56 ./run-tests.py nfc_wps_handover_with_pw_token_set DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_handover_with_pw_token_set 1/1 Test: Connect to WPS AP with NFC connection handover (wps_nfc_* set) Starting AP wlan3 NFC connection handover PASS nfc_wps_handover_with_pw_token_set 0.801833 2020-04-17 13:08:57.880828 passed all 1 test case(s) 2020-04-17 13:08:57 ./run-tests.py nfc_wps_password_token_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_password_token_ap 1/1 Test: WPS registrar configuring an AP using AP password token Starting AP wlan3 WPS configuration step PASS nfc_wps_password_token_ap 4.722728 2020-04-17 13:09:03.037583 passed all 1 test case(s) 2020-04-17 13:09:03 ./run-tests.py nfc_wps_password_token_ap_preconf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_password_token_ap_preconf 1/1 Test: WPS registrar configuring an AP using preconfigured AP password token Starting AP wlan3 WPS configuration step PASS nfc_wps_password_token_ap_preconf 4.694273 2020-04-17 13:09:08.142854 passed all 1 test case(s) 2020-04-17 13:09:08 ./stop.sh 2020-04-17 13:09:09 ./start.sh channels=4 2020-04-17 13:09:10 ./stop.sh