2021-02-03 00:04:54 export USER=root 2021-02-03 00:04:54 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2021-02-03 00:06:06 ./start.sh 2021-02-03 00:06:06 ./run-tests.py ap_acs_hw_mode_any_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_acs_hw_mode_any_5ghz 1/1 Test: Automatic channel selection with hw_mode=any and 5 GHz Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS ap_acs_hw_mode_any_5ghz 12.909362 2021-02-03 00:06:20.765348 passed all 1 test case(s) 2021-02-03 00:06:20 ./run-tests.py ap_csa_2_switches_count_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_csa_2_switches_count_1 1/1 Test: AP Channel Switch, two switches with count 1 Starting AP wlan3 Connect STA wlan0 to AP dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_csa.py", line 139, in test_ap_csa_2_switches_count_1 hwsim_utils.test_connectivity(dev[0], ap) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL ap_csa_2_switches_count_1 5.255997 2021-02-03 00:06:26.179210 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_csa_2_switches_count_1 2021-02-03 00:06:26 ./run-tests.py ap_ft_pmf_over_ds DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_pmf_over_ds 1/1 Test: WPA2-PSK-FT AP over DS with PMF Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_pmf_over_ds 0.668993 2021-02-03 00:06:27.012678 passed all 1 test case(s) 2021-02-03 00:06:27 ./run-tests.py ap_ft_sae_ptk_rekey1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_sae_ptk_rekey1 1/1 Test: WPA2-PSK-FT-SAE AP and PTK rekey triggered by station Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP PASS ap_ft_sae_ptk_rekey1 1.487963 2021-02-03 00:06:28.658113 passed all 1 test case(s) 2021-02-03 00:06:28 ./run-tests.py ap_ft_sae_rsnxe_used_mismatch2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_sae_rsnxe_used_mismatch2 1/1 Test: FT-SAE AP and unexpected RSNXE Used in ReassocResp Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP PASS ap_ft_sae_rsnxe_used_mismatch2 0.754793 2021-02-03 00:06:29.569400 passed all 1 test case(s) 2021-02-03 00:06:29 ./run-tests.py ap_ft_skip_prune_assoc2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_skip_prune_assoc2 1/1 Test: WPA2-PSK-FT AP with skip_prune_assoc (disable full_ap_client_state) Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_skip_prune_assoc2 0.496598 2021-02-03 00:06:30.222631 passed all 1 test case(s) 2021-02-03 00:06:30 ./run-tests.py ap_hs20_external_selection DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_external_selection 1/1 Test: Hotspot 2.0 connection using external network selection and creation Starting AP wlan3 Connect STA wlan0 to AP PASS ap_hs20_external_selection 0.268145 2021-02-03 00:06:30.643985 passed all 1 test case(s) 2021-02-03 00:06:30 ./run-tests.py ap_hs20_fetch_osu_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_fetch_osu_proto 1/1 Test: Hotspot 2.0 OSU provider and protocol testing Starting AP wlan3 PASS ap_hs20_fetch_osu_proto 1.204107 2021-02-03 00:06:32.004099 passed all 1 test case(s) 2021-02-03 00:06:32 ./run-tests.py ap_hs20_min_bandwidth_and_roaming_partner_preference DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_min_bandwidth_and_roaming_partner_preference 1/1 Test: Hotspot 2.0 and minimum bandwidth with roaming partner preference Starting AP wlan3 Starting AP wlan4 PASS ap_hs20_min_bandwidth_and_roaming_partner_preference 0.64994 2021-02-03 00:06:32.814619 passed all 1 test case(s) 2021-02-03 00:06:32 ./run-tests.py ap_hs20_min_bandwidth_no_wan_metrics DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_min_bandwidth_no_wan_metrics 1/1 Test: Hotspot 2.0 network selection with min bandwidth but no WAN Metrics Starting AP wlan3 PASS ap_hs20_min_bandwidth_no_wan_metrics 0.180371 2021-02-03 00:06:33.156209 passed all 1 test case(s) 2021-02-03 00:06:33 ./run-tests.py ap_hs20_network_preference2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_network_preference2 1/1 Test: Hotspot 2.0 network selection with preferred credential Starting AP wlan4 Starting AP wlan3 PASS ap_hs20_network_preference2 0.510504 2021-02-03 00:06:33.826628 passed all 1 test case(s) 2021-02-03 00:06:33 ./run-tests.py ap_hs20_osen DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_osen 1/1 Test: Hotspot 2.0 OSEN connection Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan5 to AP PASS ap_hs20_osen 0.476851 2021-02-03 00:06:34.462415 passed all 1 test case(s) 2021-02-03 00:06:34 ./run-tests.py ap_hs20_proxyarp_disable_dgaf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_proxyarp_disable_dgaf 1/1 Test: Hotspot 2.0 and ProxyARP with DGAF disabled Starting AP wlan3 Connect STA wlan1 to AP After connect: ['192.168.1.123 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT', 'aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT'] After disconnect: [] PASS ap_hs20_proxyarp_disable_dgaf 1.208 2021-02-03 00:06:35.823218 passed all 1 test case(s) 2021-02-03 00:06:35 ./run-tests.py ap_ht40_csa3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_csa3 1/1 Test: HT with 40 MHz channel width and CSA Starting AP wlan3 Connect STA wlan0 to AP dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ht.py", line 1142, in test_ap_ht40_csa3 hwsim_utils.test_connectivity(dev[0], hapd) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL ap_ht40_csa3 5.677041 2021-02-03 00:06:41.659603 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_ht40_csa3 2021-02-03 00:06:41 ./run-tests.py ap_ht40_scan_conflict DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_scan_conflict 1/1 Test: HT40 co-ex scan conflict Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht40_scan_conflict 2.874248 2021-02-03 00:06:44.693659 passed all 1 test case(s) 2021-02-03 00:06:44 ./run-tests.py ap_open_unexpected_assoc_event DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_unexpected_assoc_event 1/1 Test: AP with open mode and unexpected association event Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_unexpected_assoc_event 0.563543 2021-02-03 00:06:45.417773 passed all 1 test case(s) 2021-02-03 00:06:45 ./run-tests.py ap_pmf_sta_sa_query_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_sta_sa_query_oom 1/1 Test: WPA2-PSK AP with station using SA Query (OOM) Connect STA wlan0 to AP PASS ap_pmf_sta_sa_query_oom 0.375688 2021-02-03 00:06:45.951757 passed all 1 test case(s) 2021-02-03 00:06:45 ./run-tests.py ap_roam_wpa2_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_roam_wpa2_psk 1/1 Test: Roam between two WPA2-PSK APs Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_roam_wpa2_psk 14.776256 2021-02-03 00:07:00.883474 passed all 1 test case(s) 2021-02-03 00:07:00 ./run-tests.py ap_vht80_csa DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80_csa 1/1 Test: VHT with 80 MHz channel width and CSA Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_vht.py", line 739, in test_ap_vht80_csa hwsim_utils.test_connectivity(dev[0], hapd) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL ap_vht80_csa 5.77785 2021-02-03 00:07:06.818475 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_vht80_csa 2021-02-03 00:07:06 ./run-tests.py ap_wowlan_triggers DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wowlan_triggers 1/1 Test: AP with wowlan_triggers Starting AP wlan3 Connect STA wlan0 to AP dev2->dev1 unicast data delivery failed Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_params.py", line 845, in test_ap_wowlan_triggers hwsim_utils.test_connectivity(dev[0], hapd) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev2->dev1 unicast data delivery failed FAIL ap_wowlan_triggers 5.259493 2021-02-03 00:07:12.239506 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wowlan_triggers 2021-02-03 00:07:12 ./run-tests.py ap_wpa2_eap_pwd_salt_sha1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_pwd_salt_sha1 1/1 Test: WPA2-Enterprise connection using EAP-pwd and salted password SHA-1 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_pwd_salt_sha1 0.235241 2021-02-03 00:07:12.640604 passed all 1 test case(s) 2021-02-03 00:07:12 ./run-tests.py ap_wpa2_eap_ttls_dh_params_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_dh_params_invalid 1/1 Test: EAP-TLS server and invalid dhparams file Starting AP wlan3 PASS ap_wpa2_eap_ttls_dh_params_invalid 0.055963 2021-02-03 00:07:12.855433 passed all 1 test case(s) 2021-02-03 00:07:12 ./run-tests.py ap_wpa2_eap_ttls_eap_md5_server_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_eap_md5_server_oom 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/EAP-MD5 - server OOM Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_eap_md5_server_oom 0.339437 2021-02-03 00:07:13.351569 passed all 1 test case(s) 2021-02-03 00:07:13 ./run-tests.py ap_wpa2_eap_unexpected_wep_eapol_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_unexpected_wep_eapol_key 1/1 Test: WPA2-Enterprise connection and unexpected WEP EAPOL-Key Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_unexpected_wep_eapol_key 0.23947 2021-02-03 00:07:13.746338 passed all 1 test case(s) 2021-02-03 00:07:13 ./run-tests.py ap_wpa2_psk_incorrect_passphrase DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_incorrect_passphrase 1/1 Test: WPA2-PSK AP and station using incorrect passphrase Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_incorrect_passphrase 10.444571 2021-02-03 00:07:24.348540 passed all 1 test case(s) 2021-02-03 00:07:24 ./run-tests.py ap_wpa2_psk_supp_proto_gtk_tx_bit_workaround DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_supp_proto_gtk_tx_bit_workaround 1/1 Test: WPA2-PSK supplicant protocol testing: GTK TX bit workaround Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_supp_proto_gtk_tx_bit_workaround 0.233467 2021-02-03 00:07:24.741161 passed all 1 test case(s) 2021-02-03 00:07:24 ./run-tests.py ap_wpa2_tdls_diff_rsnie DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_tdls_diff_rsnie 1/1 Test: TDLS with different RSN IEs Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS Teardown TDLS PASS ap_wpa2_tdls_diff_rsnie 3.017181 2021-02-03 00:07:27.916099 passed all 1 test case(s) 2021-02-03 00:07:27 ./run-tests.py ap_wps_and_bss_limit DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_and_bss_limit 1/1 Test: WPS and wpa_supplicant BSS entry limit Starting AP wlan3 Starting AP wlan4 PASS ap_wps_and_bss_limit 4.243865 2021-02-03 00:07:32.321394 passed all 1 test case(s) 2021-02-03 00:07:32 ./run-tests.py ap_wps_authenticator_mismatch_m2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_authenticator_mismatch_m2 1/1 Test: WPS and Authenticator attribute mismatch in M2 Starting AP wlan3 PASS ap_wps_authenticator_mismatch_m2 0.262258 2021-02-03 00:07:32.744824 passed all 1 test case(s) 2021-02-03 00:07:32 ./run-tests.py ap_wps_er_http_proto_upnp_info_no_device_type DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto_upnp_info_no_device_type 1/1 Test: WPS ER HTTP protocol testing - No deviceType in UPnP info HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 PASS ap_wps_er_http_proto_upnp_info_no_device_type 2.038222 2021-02-03 00:07:34.943100 passed all 1 test case(s) 2021-02-03 00:07:34 ./run-tests.py ap_wps_er_init_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_init_oom 1/1 Test: WPS ER and OOM during init PASS ap_wps_er_init_oom 0.044205 2021-02-03 00:07:35.146994 passed all 1 test case(s) 2021-02-03 00:07:35 ./run-tests.py ap_wps_er_ssdp_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_ssdp_proto 1/1 Test: WPS ER SSDP protocol testing PASS ap_wps_er_ssdp_proto 2.33919 2021-02-03 00:07:37.642445 passed all 1 test case(s) 2021-02-03 00:07:37 ./run-tests.py ap_wps_m5_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_m5_oom 1/1 Test: WPS and OOM for M5 on STA Starting AP wlan3 PASS ap_wps_m5_oom 0.463147 2021-02-03 00:07:38.266681 passed all 1 test case(s) 2021-02-03 00:07:38 ./run-tests.py ap_wps_new_version_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_new_version_ap 1/1 Test: WPS compatibility with new version number on the AP Starting AP wlan3 WPS provisioning step PASS ap_wps_new_version_ap 0.34721 2021-02-03 00:07:38.773379 passed all 1 test case(s) 2021-02-03 00:07:38 ./run-tests.py autogo_noa DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_noa 1/1 Test: P2P autonomous GO and NoA Start autonomous GO wlan0 Connect STA wlan1 to AP PASS autogo_noa 0.273418 2021-02-03 00:07:39.204520 passed all 1 test case(s) 2021-02-03 00:07:39 ./run-tests.py bgscan_learn_beacon_loss DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START bgscan_learn_beacon_loss 1/1 Test: bgscan_simple and beacon loss Starting AP wlan3 Connect STA wlan0 to AP PASS bgscan_learn_beacon_loss 1.483879 2021-02-03 00:07:40.845941 passed all 1 test case(s) 2021-02-03 00:07:40 ./run-tests.py dbus_wps_cancel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_wps_cancel 1/1 Test: D-Bus WPS Cancel operation No dbus module available Skip test case: No dbus module available SKIP dbus_wps_cancel 0.035014 2021-02-03 00:07:41.041998 passed all 0 test case(s) skipped 1 test case(s) 2021-02-03 00:07:41 ./run-tests.py dfs_radar_chanlist_vht20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dfs_radar_chanlist_vht20 1/1 Test: DFS chanlist when radar is detected and VHT40 configured Starting AP wlan3 on DFS channel Starting AP wlan3 Trigger a simulated radar event Connect STA wlan0 to AP Country code at the end: 00 PASS dfs_radar_chanlist_vht20 4.180751 2021-02-03 00:07:45.385070 passed all 1 test case(s) 2021-02-03 00:07:45 ./run-tests.py dpp_auto_connect_2_ver1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_auto_connect_2_ver1 1/1 Test: DPP and auto connect (2; AP and STA using ver 1) Starting AP wlan3 PASS dpp_auto_connect_2_ver1 5.955091 2021-02-03 00:07:51.497018 passed all 1 test case(s) 2021-02-03 00:07:51 ./run-tests.py dpp_config_connector_error_invalid_timestamp_date DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_connector_error_invalid_timestamp_date 1/1 Test: DPP Config Object connector error - invalid timestamp date Skip test case: OpenSSL python method not available SKIP dpp_config_connector_error_invalid_timestamp_date 0.033603 2021-02-03 00:07:51.689628 passed all 0 test case(s) skipped 1 test case(s) 2021-02-03 00:07:51 ./run-tests.py dpp_config_dpp_override_prime256v1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_override_prime256v1 1/1 Test: DPP Config Object override (P-256) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_override_prime256v1 2.065779 2021-02-03 00:07:53.917437 passed all 1 test case(s) 2021-02-03 00:07:53 ./run-tests.py dpp_config_jwk_error_no_y DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jwk_error_no_y 1/1 Test: DPP Config Object JWK error - no y dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jwk_error_no_y 0.055721 2021-02-03 00:07:54.128549 passed all 1 test case(s) 2021-02-03 00:07:54 ./run-tests.py dpp_config_legacy_gen DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_legacy_gen 1/1 Test: Generate DPP Config Object for legacy network dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_legacy_gen 0.053415 2021-02-03 00:07:54.337242 passed all 1 test case(s) 2021-02-03 00:07:54 ./run-tests.py dpp_proto_auth_conf_invalid_i_bootstrap_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_conf_invalid_i_bootstrap_key 1/1 Test: DPP protocol testing - invalid I-bootstrap key in Auth Conf PASS dpp_proto_auth_conf_invalid_i_bootstrap_key 0.048936 2021-02-03 00:07:54.544633 passed all 1 test case(s) 2021-02-03 00:07:54 ./run-tests.py dpp_proto_auth_conf_no_wrapped_data DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_conf_no_wrapped_data 1/1 Test: DPP protocol testing - no Wrapped Data in Auth Conf PASS dpp_proto_auth_conf_no_wrapped_data 0.047731 2021-02-03 00:07:54.752618 passed all 1 test case(s) 2021-02-03 00:07:54 ./run-tests.py dpp_proto_auth_resp_i_nonce_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_resp_i_nonce_mismatch 1/1 Test: DPP protocol testing - I-nonce mismatch in Auth Resp PASS dpp_proto_auth_resp_i_nonce_mismatch 0.148387 2021-02-03 00:07:55.060516 passed all 1 test case(s) 2021-02-03 00:07:55 ./run-tests.py dpp_qr_code_auth_mutual2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_auth_mutual2 1/1 Test: DPP QR Code and authentication exchange (mutual2) dev0 displays QR Code dev1 displays QR Code dev1 scans QR Code and initiates DPP Authentication dev0 scans QR Code PASS dpp_qr_code_auth_mutual2 3.062129 2021-02-03 00:07:58.280291 passed all 1 test case(s) 2021-02-03 00:07:58 ./run-tests.py dpp_qr_code_auth_mutual_p_521 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_auth_mutual_p_521 1/1 Test: DPP QR Code and authentication exchange (mutual, autogen P-521) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication dev0 scans QR Code PASS dpp_qr_code_auth_mutual_p_521 1.060108 2021-02-03 00:07:59.499497 passed all 1 test case(s) 2021-02-03 00:07:59 ./run-tests.py dpp_qr_code_auth_rand_mac_addr DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_auth_rand_mac_addr 1/1 Test: DPP QR Code and authentication exchange (rand_mac_addr=1) Skip test case: Driver does not support random GAS TA SKIP dpp_qr_code_auth_rand_mac_addr 0.035043 2021-02-03 00:07:59.693564 passed all 0 test case(s) skipped 1 test case(s) 2021-02-03 00:07:59 ./run-tests.py eap_teap_basic_password_auth_user_and_machine_no_machine DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_basic_password_auth_user_and_machine_no_machine 1/1 Test: EAP-TEAP with Basic-Password-Auth using user and machine credentials (no machine) Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_basic_password_auth_user_and_machine_no_machine 0.212537 2021-02-03 00:08:00.068075 passed all 1 test case(s) 2021-02-03 00:08:00 ./run-tests.py eap_teap_tls_cs_sha1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_tls_cs_sha1 1/1 Test: EAP-TEAP with TLS cipher suite that uses SHA-1 Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_tls_cs_sha1 0.215339 2021-02-03 00:08:00.441304 passed all 1 test case(s) 2021-02-03 00:08:00 ./run-tests.py erp_local_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START erp_local_errors 1/1 Test: ERP and local error cases Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS erp_local_errors 1.654486 2021-02-03 00:08:02.252257 passed all 1 test case(s) 2021-02-03 00:08:02 ./run-tests.py erp_radius_eap_tls_v13 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START erp_radius_eap_tls_v13 1/1 Test: ERP enabled on RADIUS server and peer using EAP-TLS v1.3 Starting AP as-erp Starting AP wlan3 Connect STA wlan0 to AP PASS erp_radius_eap_tls_v13 0.283183 2021-02-03 00:08:02.692945 passed all 1 test case(s) 2021-02-03 00:08:02 ./run-tests.py fst_ap_ack_request_with_bad_fsts_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_ack_request_with_bad_fsts_id 1/1 Test: FST AP ack request with bad fsts id Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad scenario was handled correctly (Ack request received with bad fsts_id) PASS fst_ap_ack_request_with_bad_fsts_id 5.522014 2021-02-03 00:08:08.372576 passed all 1 test case(s) 2021-02-03 00:08:08 ./run-tests.py fst_ap_initiate_session_response_with_zero_llt DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_initiate_session_response_with_zero_llt 1/1 Test: FST AP initiate session - zero llt Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Response with zero llt) PASS fst_ap_initiate_session_response_with_zero_llt 0.486703 2021-02-03 00:08:09.019710 passed all 1 test case(s) 2021-02-03 00:08:09 ./run-tests.py fst_ap_tear_down_session_bad_fsts_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_tear_down_session_bad_fsts_id 1/1 Test: FST AP tear down session - bad fsts id Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Bad fsts_id) PASS fst_ap_tear_down_session_bad_fsts_id 5.495795 2021-02-03 00:08:14.675082 passed all 1 test case(s) 2021-02-03 00:08:14 ./run-tests.py gas_anqp_address3_ap_non_compliant DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_address3_ap_non_compliant 1/1 Test: GAS/ANQP query using IEEE 802.11 non-compliant Address 3 (AP) Starting AP wlan3 PASS gas_anqp_address3_ap_non_compliant 0.443631 2021-02-03 00:08:15.274815 passed all 1 test case(s) 2021-02-03 00:08:15 ./run-tests.py gas_anqp_address3_assoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_address3_assoc 1/1 Test: GAS/ANQP query using IEEE 802.11 compliant Address 3 value when associated Starting AP wlan3 Connect STA wlan0 to AP PASS gas_anqp_address3_assoc 0.536333 2021-02-03 00:08:15.968907 passed all 1 test case(s) 2021-02-03 00:08:15 ./run-tests.py gas_stop_fetch_anqp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_stop_fetch_anqp 1/1 Test: Stop FETCH_ANQP operation Starting AP wlan3 PASS gas_stop_fetch_anqp 0.148113 2021-02-03 00:08:16.272233 passed all 1 test case(s) 2021-02-03 00:08:16 ./run-tests.py grpform_force_chan_conflict DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_force_chan_conflict 1/1 Test: P2P group formation fails due to forced channel mismatch Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 PASS grpform_force_chan_conflict 1.543236 2021-02-03 00:08:17.974097 passed all 1 test case(s) 2021-02-03 00:08:18 ./run-tests.py grpform_no_wsc_done DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_no_wsc_done 1/1 Test: P2P group formation with WSC-Done not sent wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Drop WSC_Done wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Drop WSC_Done PASS grpform_no_wsc_done 1.468339 2021-02-03 00:08:19.599329 passed all 1 test case(s) 2021-02-03 00:08:19 ./run-tests.py he160_no_dfs_120_minus DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he160_no_dfs_120_minus 1/1 Test: HE with 160 MHz channel width and no DFS (120 minus) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS he160_no_dfs_120_minus 0.789011 2021-02-03 00:08:20.543017 passed all 1 test case(s) 2021-02-03 00:08:20 ./run-tests.py he80_invalid2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he80_invalid2 1/1 Test: HE with invalid 80 MHz channel configuration (seg0) Starting AP wlan3 Country code at the end: 00 PASS he80_invalid2 1.072566 2021-02-03 00:08:21.769668 passed all 1 test case(s) 2021-02-03 00:08:21 ./run-tests.py he_params DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_params 1/1 Test: HE AP parameters Starting AP wlan3 Connect STA wlan0 to AP PASS he_params 0.227878 2021-02-03 00:08:22.153712 passed all 1 test case(s) 2021-02-03 00:08:22 ./run-tests.py ieee8021x_held DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_held 1/1 Test: IEEE 802.1X and HELD state Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_held 3.384748 2021-02-03 00:08:25.697686 passed all 1 test case(s) 2021-02-03 00:08:25 ./run-tests.py macsec_psk_shorter_ckn2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_shorter_ckn2 1/1 Test: MACsec PSK (shorter CKN, unaligned) Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_shorter_ckn2 0.075782 2021-02-03 00:08:25.931948 passed all 0 test case(s) skipped 1 test case(s) 2021-02-03 00:08:25 ./run-tests.py mbo_non_pref_chan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_non_pref_chan 1/1 Test: MBO non-preferred channel list Starting AP wlan3 Connect STA wlan0 to AP PASS mbo_non_pref_chan 0.587402 2021-02-03 00:08:26.695997 passed all 1 test case(s) 2021-02-03 00:08:26 ./run-tests.py mbo_sta_supp_op_classes DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_sta_supp_op_classes 1/1 Test: MBO STA supported operating classes Starting AP wlan3 Connect STA wlan0 to AP PASS mbo_sta_supp_op_classes 0.178048 2021-02-03 00:08:27.033942 passed all 1 test case(s) 2021-02-03 00:08:27 ./run-tests.py mbo_supp_oper_classes_us_disable_vht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_supp_oper_classes_us_disable_vht 1/1 Test: MBO and supported operating classes (US) - disable_vht Starting AP wlan4 Country: US Connect STA wlan0 to AP Country code at the end (1): US Country code at the end (2): 00 Country code at the end (3): 00 PASS mbo_supp_oper_classes_us_disable_vht 0.680999 2021-02-03 00:08:27.873065 passed all 1 test case(s) 2021-02-03 00:08:27 ./run-tests.py mesh_forwarding DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_forwarding 1/1 Test: Mesh with two stations that can't reach each other directly PASS mesh_forwarding 1.222768 2021-02-03 00:08:29.250539 passed all 1 test case(s) 2021-02-03 00:08:29 ./run-tests.py nfc_p2p_static_handover_join_tagdev_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_p2p_static_handover_join_tagdev_go 1/1 Test: NFC static handover to join a P2P group (NFC Tag device is the GO) Start autonomous GO Write NFC Tag on the GO Read NFC Tag on a P2P Device to join a group Read NFC Tag on another P2P Device to join a group PASS nfc_p2p_static_handover_join_tagdev_go 1.93676 2021-02-03 00:08:31.340844 passed all 1 test case(s) 2021-02-03 00:08:31 ./run-tests.py p2p_channel_5ghz_only DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_channel_5ghz_only 1/1 Test: P2P GO start with only 5 GHz band allowed Start autonomous GO wlan0 Country code at the end: 00 PASS p2p_channel_5ghz_only 0.389332 2021-02-03 00:08:31.885213 passed all 1 test case(s) 2021-02-03 00:08:31 ./run-tests.py p2p_go_invite DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_go_invite 1/1 Test: P2P GO inviting a client to join Generate BSS table entry for old group Discover peer wlan0: Trying to discover peer 02:00:00:00:01:00 Start GO on non-social channel Invite peer to join the group Join the group wlan1: Trying to discover peer 02:00:00:00:00:00 Client connected Terminate group PASS p2p_go_invite 8.152832 2021-02-03 00:08:40.194870 passed all 1 test case(s) 2021-02-03 00:08:40 ./run-tests.py p2p_msg_go_neg_req_reject DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_msg_go_neg_req_reject 1/1 Test: P2P protocol tests for user reject incorrectly in GO Neg Req wlan1: Trying to discover peer 02:00:00:00:00:00 PASS p2p_msg_go_neg_req_reject 1.433934 2021-02-03 00:08:41.788539 passed all 1 test case(s) 2021-02-03 00:08:41 ./run-tests.py p2ps_exact_search_srvinfo DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_exact_search_srvinfo 1/1 Test: P2PS exact service request with service info PASS p2ps_exact_search_srvinfo 0.239895 2021-02-03 00:08:42.184485 passed all 1 test case(s) 2021-02-03 00:08:42 ./run-tests.py pmksa_cache_and_ptk_rekey_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pmksa_cache_and_ptk_rekey_ap 1/1 Test: PMKSA caching and PTK rekey triggered by AP Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 Roam to AP2 Roam back to AP1 PASS pmksa_cache_and_ptk_rekey_ap 2.564103 2021-02-03 00:08:44.903896 passed all 1 test case(s) 2021-02-03 00:08:44 ./run-tests.py pmksa_cache_preauth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pmksa_cache_preauth 1/1 Test: RSN pre-authentication to generate PMKSA cache entry Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS pmksa_cache_preauth 0.748757 2021-02-03 00:08:45.809016 passed all 1 test case(s) 2021-02-03 00:08:45 ./run-tests.py radius_acct_pmksa_caching DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_acct_pmksa_caching 1/1 Test: RADIUS Accounting with PMKSA caching Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS radius_acct_pmksa_caching 0.516278 2021-02-03 00:08:46.481772 passed all 1 test case(s) 2021-02-03 00:08:46 ./run-tests.py sae_and_psk_transition_disable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_and_psk_transition_disable 1/1 Test: SAE and PSK transition disable indication Starting AP wlan3 Connect STA wlan0 to AP PASS sae_and_psk_transition_disable 0.291366 2021-02-03 00:08:46.933173 passed all 1 test case(s) 2021-02-03 00:08:46 ./run-tests.py sae_h2e_rsnxe_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_h2e_rsnxe_mismatch 1/1 Test: SAE H2E and RSNXE mismatch in EAPOL-Key msg 2/4 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_h2e_rsnxe_mismatch 0.374933 2021-02-03 00:08:47.464601 passed all 1 test case(s) 2021-02-03 00:08:47 ./run-tests.py scan_abort DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_abort 1/1 Test: Aborting a full scan PASS scan_abort 0.0409 2021-02-03 00:08:47.664114 passed all 1 test case(s) 2021-02-03 00:08:47 ./run-tests.py scan_for_auth_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_for_auth_fail 1/1 Test: cfg80211 workaround with scan-for-auth failing Starting AP wlan3 Connect STA wlan0 to AP PASS scan_for_auth_fail 0.362718 2021-02-03 00:08:48.181330 passed all 1 test case(s) 2021-02-03 00:08:48 ./run-tests.py sigma_dut_ap_sae_pk_misbehavior DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_sae_pk_misbehavior 1/1 Test: sigma_dut controlled AP using SAE-PK misbehavior Skip test case: sigma_dut not available SKIP sigma_dut_ap_sae_pk_misbehavior 0.062682 2021-02-03 00:08:48.401901 passed all 0 test case(s) skipped 1 test case(s) 2021-02-03 00:08:48 ./run-tests.py sigma_dut_dpp_nfc_handover_requestor_enrollee DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_nfc_handover_requestor_enrollee 1/1 Test: sigma_dut DPP/NFC handover requestor as Enrollee Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_dpp_nfc_handover_requestor_enrollee 0.096988 2021-02-03 00:08:48.660086 passed all 0 test case(s) skipped 1 test case(s) 2021-02-03 00:08:48 ./run-tests.py sigma_dut_sae_pw_id_ft DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_sae_pw_id_ft 1/1 Test: sigma_dut controlled SAE association with Password Identifier and FT Skip test case: sigma_dut not available SKIP sigma_dut_sae_pw_id_ft 0.033816 2021-02-03 00:08:48.854774 passed all 0 test case(s) skipped 1 test case(s) 2021-02-03 00:08:48 ./run-tests.py tspec_ap_parsing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tspec_ap_parsing 1/1 Test: TSPEC AP parsing tests Starting AP wlan3 Connect STA wlan0 to AP PASS tspec_ap_parsing 0.218362 2021-02-03 00:08:49.232161 passed all 1 test case(s) 2021-02-03 00:08:49 ./run-tests.py wifi_display_go_invite DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wifi_display_go_invite 1/1 Test: P2P GO with Wi-Fi Display inviting a client to join wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 Authorize invitation Try to connect the client to the GO wlan2: Trying to discover peer 02:00:00:00:00:00 Client connected Invite peer to join the group PASS wifi_display_go_invite 1.482665 2021-02-03 00:08:50.870367 passed all 1 test case(s) 2021-02-03 00:08:50 ./run-tests.py wnm_sleep_mode_open_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_sleep_mode_open_fail 1/1 Test: WNM Sleep Mode - open (fail) Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_sleep_mode_open_fail 0.195912 2021-02-03 00:08:51.225212 passed all 1 test case(s) 2021-02-03 00:08:51 ./run-tests.py wpa2_ocv_ap_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_ap_mismatch 1/1 Test: OCV AP mismatch Starting AP wlan3 Connect STA wlan0 to AP Send EAPOL-Key msg 2/4 Send EAPOL-Key msg 2/4 Send EAPOL-Key msg 2/4 Send EAPOL-Key msg 2/4 Send EAPOL-Key msg 2/4 Send EAPOL-Key msg 2/4 Send EAPOL-Key msg 4/4 PASS wpa2_ocv_ap_mismatch 4.309702 2021-02-03 00:08:55.693607 passed all 1 test case(s) 2021-02-03 00:08:55 ./run-tests.py wpas_ctrl_cred DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_cred 1/1 Test: wpa_supplicant ctrl_iface cred set PASS wpas_ctrl_cred 0.126635 2021-02-03 00:08:55.979963 passed all 1 test case(s) 2021-02-03 00:08:56 ./run-tests.py wpas_ctrl_wps_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_wps_errors 1/1 Test: wpa_supplicant ctrl_iface WPS error cases PASS wpas_ctrl_wps_errors 0.03499 2021-02-03 00:08:56.171238 passed all 1 test case(s) 2021-02-03 00:08:56 ./run-tests.py wpas_mesh_password_mismatch_retry DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_mesh_password_mismatch_retry 1/1 Test: Mesh password mismatch and retry Skip test case: Skip test case with long duration due to --long not specified SKIP wpas_mesh_password_mismatch_retry 0.034659 2021-02-03 00:08:56.366421 passed all 0 test case(s) skipped 1 test case(s) 2021-02-03 00:08:56 ./run-tests.py wps_ext_ap_settings_mac_addr_missing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_ap_settings_mac_addr_missing 1/1 Test: WPS and AP Settings: missing MAC Address Starting AP wlan3 PASS wps_ext_ap_settings_mac_addr_missing 0.329988 2021-02-03 00:08:56.861621 passed all 1 test case(s) 2021-02-03 00:08:56 ./stop.sh