2022-03-29 05:38:38 export USER=root 2022-03-29 05:38:38 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2022-03-29 05:39:25 ./start.sh 2022-03-29 05:39:26 ./run-tests.py ap_country DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_country 1/1 Test: WPA2-PSK AP setting country code and using 5 GHz band Starting AP wlan3 Connect STA wlan0 to AP PASS ap_country 1.656465 2022-03-29 05:39:28.891123 passed all 1 test case(s) 2022-03-29 05:39:28 ./run-tests.py ap_ft_over_ds_pull_vlan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_over_ds_pull_vlan 1/1 Test: WPA2-PSK-FT AP over DS (pull PMK) with VLAN Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_over_ds_pull_vlan 3.64545 2022-03-29 05:39:32.723574 passed all 1 test case(s) 2022-03-29 05:39:32 ./run-tests.py ap_hs20_excluded_ssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_excluded_ssid 1/1 Test: Hotspot 2.0 exclusion based on SSID Starting AP wlan3 Starting AP wlan4 Verify network selection to AP wlan4 Verify network selection to AP wlan3 Verify network selection to AP wlan4 Verify network selection to AP wlan4 PASS ap_hs20_excluded_ssid 20.795365 2022-03-29 05:39:53.699636 passed all 1 test case(s) 2022-03-29 05:39:53 ./run-tests.py ap_hs20_remediation_required DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_remediation_required 1/1 Test: Hotspot 2.0 connection and remediation required from RADIUS Starting AP wlan3 PASS ap_hs20_remediation_required 1.616642 2022-03-29 05:39:55.483798 passed all 1 test case(s) 2022-03-29 05:39:55 ./run-tests.py ap_ht40_scan_ht20_conflict DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_scan_ht20_conflict 1/1 Test: HT40 co-ex scan conflict with HT 20 MHz AP Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht40_scan_ht20_conflict 3.58222 2022-03-29 05:39:59.230444 passed all 1 test case(s) 2022-03-29 05:39:59 ./run-tests.py ap_ht40_scan_legacy_conflict DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_scan_legacy_conflict 1/1 Test: HT40 co-ex scan conflict with legacy 20 MHz AP Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht40_scan_legacy_conflict 3.503406 2022-03-29 05:40:02.900710 passed all 1 test case(s) 2022-03-29 05:40:02 ./run-tests.py ap_ht_op_class_127 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht_op_class_127 1/1 Test: HT40 on operationg class 127 Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht_op_class_127 4.218301 2022-03-29 05:40:07.284821 passed all 1 test case(s) 2022-03-29 05:40:07 ./run-tests.py ap_open_pmf_default DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_pmf_default 1/1 Test: AP with open mode (no security) configuration and pmf=2 Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP PASS ap_open_pmf_default 2.001776 2022-03-29 05:40:09.452237 passed all 1 test case(s) 2022-03-29 05:40:09 ./run-tests.py ap_pmf_beacon_protection_bip_gmac_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_beacon_protection_bip_gmac_256 1/1 Test: WPA2-PSK Beacon protection (BIP-GMAC-256) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP STA key: {'ifindex': 'wlan0', 'key': 'ea8201228482d0f68b2c2e44d2897d73a5af44392f7d649acea6dd55027aac0d', 'icverrors': '0', 'replays': '0', 'rx_spec': '00000000000d', 'tx_spec': '000000000000', 'algorithm': '00-0f-ac:12', 'hw_key_idx': '0', 'keyidx': '6', 'flags': '0x0', 'keylen': '32'} AP key: {'ifindex': 'wlan3', 'key': 'ea8201228482d0f68b2c2e44d2897d73a5af44392f7d649acea6dd55027aac0d', 'icverrors': '0', 'replays': '0', 'rx_spec': '000000000000', 'tx_spec': '00000000000d', 'algorithm': '00-0f-ac:12', 'hw_key_idx': '0', 'keyidx': '6', 'flags': '0x0', 'keylen': '32'} wlantest BIP counters: valid=0 invalid=0 missing=0 PASS ap_pmf_beacon_protection_bip_gmac_256 2.983358 2022-03-29 05:40:12.601635 passed all 1 test case(s) 2022-03-29 05:40:12 ./run-tests.py ap_reassociation_to_same_bss DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_reassociation_to_same_bss 1/1 Test: Reassociate to the same BSS Starting AP wlan3 Connect STA wlan0 to AP PASS ap_reassociation_to_same_bss 12.646764 2022-03-29 05:40:25.407535 passed all 1 test case(s) 2022-03-29 05:40:25 ./run-tests.py ap_vht80b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80b 1/1 Test: VHT with 80 MHz channel width (HT40- channel 40) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS ap_vht80b 2.315015 2022-03-29 05:40:27.886788 passed all 1 test case(s) 2022-03-29 05:40:27 ./run-tests.py ap_wpa2_already_in_bridge DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_already_in_bridge 1/1 Test: hostapd behavior with interface already in bridge Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_already_in_bridge 1.732527 2022-03-29 05:40:29.786023 passed all 1 test case(s) 2022-03-29 05:40:29 ./run-tests.py ap_wpa2_disable_eapol_retry DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_disable_eapol_retry 1/1 Test: WPA2-PSK disable EAPOL-Key retry Starting AP wlan3 Verify working 4-way handshake without retries Connect STA wlan0 to AP Verify no retransmission of message 3/4 Connect STA wlan0 to AP PASS ap_wpa2_disable_eapol_retry 5.777232 2022-03-29 05:40:35.728392 passed all 1 test case(s) 2022-03-29 05:40:35 ./run-tests.py ap_wpa2_disable_eapol_retry_group DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_disable_eapol_retry_group 1/1 Test: WPA2-PSK disable EAPOL-Key retry for group handshake Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan0 to AP PASS ap_wpa2_disable_eapol_retry_group 7.531265 2022-03-29 05:40:43.424697 passed all 1 test case(s) 2022-03-29 05:40:43 ./run-tests.py ap_wpa2_eap_pwd_nthash DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_pwd_nthash 1/1 Test: WPA2-Enterprise connection using EAP-pwd and NTHash Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_wpa2_eap_pwd_nthash 4.738796 2022-03-29 05:40:48.330106 passed all 1 test case(s) 2022-03-29 05:40:48 ./run-tests.py ap_wpa2_eap_tls_domain_suffix_match_cn DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_domain_suffix_match_cn 1/1 Test: WPA2-Enterprise using EAP-TLS and domain suffix match (CN) Starting AP wlan3 Connect STA wlan1 to AP PASS ap_wpa2_eap_tls_domain_suffix_match_cn 1.422922 2022-03-29 05:40:49.917896 passed all 1 test case(s) 2022-03-29 05:40:49 ./run-tests.py ap_wpa2_eap_tls_ec_and_rsa DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_ec_and_rsa 1/1 Test: EAP-TLS and both EC and RSA sertificates certificates Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_wpa2_eap_tls_ec_and_rsa 1.853864 2022-03-29 05:40:51.936263 passed all 1 test case(s) 2022-03-29 05:40:51 ./run-tests.py ap_wpa2_psk_ext_eapol_type_diff DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ext_eapol_type_diff 1/1 Test: WPA2 4-way handshake using external EAPOL supplicant Starting AP wlan3 Connect STA wlan0 to AP Replay same data back Send EAPOL-Key msg 4/4 PASS ap_wpa2_psk_ext_eapol_type_diff 1.373259 2022-03-29 05:40:53.478652 passed all 1 test case(s) 2022-03-29 05:40:53 ./run-tests.py ap_wps_conf_and_sae_h2e DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_conf_and_sae_h2e 1/1 Test: WPS PIN provisioning with configured AP using PSK+SAE(H2E) Starting AP wlan3 PASS ap_wps_conf_and_sae_h2e 2.003918 2022-03-29 05:40:55.646546 passed all 1 test case(s) 2022-03-29 05:40:55 ./run-tests.py ap_wps_er_http_proto_subscribe_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto_subscribe_oom 1/1 Test: WPS ER HTTP protocol testing - subscribe OOM HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" HTTP server received: Ignore HTTP request: HTTP server received: Ignore HTTP request: PASS ap_wps_er_http_proto_subscribe_oom 6.22812 2022-03-29 05:41:02.041353 passed all 1 test case(s) 2022-03-29 05:41:02 ./run-tests.py ap_wps_er_learn_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_learn_oom 1/1 Test: WPS ER learn OOM Starting AP wlan3 PASS ap_wps_er_learn_oom 7.973513 2022-03-29 05:41:10.178328 passed all 1 test case(s) 2022-03-29 05:41:10 ./run-tests.py ap_wps_init_2ap_pbc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_init_2ap_pbc 1/1 Test: Initial two-radio AP configuration with first WPS PBC Enrollee Starting AP wlan3 Starting AP wlan4 WPS provisioning step PASS ap_wps_init_2ap_pbc 7.680541 2022-03-29 05:41:18.023229 passed all 1 test case(s) 2022-03-29 05:41:18 ./run-tests.py ap_wps_mixed_cred DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_mixed_cred 1/1 Test: WPS 2.0 STA merging mixed mode WPA/WPA2 credentials Starting AP wlan3 PASS ap_wps_mixed_cred 1.52259 2022-03-29 05:41:19.711233 passed all 1 test case(s) 2022-03-29 05:41:19 ./run-tests.py ap_wps_pbc_overlap_2ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_pbc_overlap_2ap 1/1 Test: WPS PBC session overlap with two active APs Starting AP wlan3 Starting AP wlan4 WPS provisioning step PASS ap_wps_pbc_overlap_2ap 5.528428 2022-03-29 05:41:25.407417 passed all 1 test case(s) 2022-03-29 05:41:25 ./run-tests.py autogo_many DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_many 1/1 Test: P2P autonomous GO with large number of GO instances Was able to add 63 groups PASS autogo_many 29.824756 2022-03-29 05:41:55.394477 passed all 1 test case(s) 2022-03-29 05:41:55 ./run-tests.py bgscan_simple_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START bgscan_simple_oom 1/1 Test: bgscan_simple OOM Starting AP wlan3 Connect STA wlan0 to AP PASS bgscan_simple_oom 1.385702 2022-03-29 05:41:56.946116 passed all 1 test case(s) 2022-03-29 05:41:56 ./run-tests.py connect_cmd_wpa2_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START connect_cmd_wpa2_psk 1/1 Test: WPA2-PSK connection using cfg80211 connect command Starting AP wlan3 Connect STA wlan5 to AP PASS connect_cmd_wpa2_psk 1.712174 2022-03-29 05:41:58.826509 passed all 1 test case(s) 2022-03-29 05:41:58 ./run-tests.py dbus_ap_scan_2_ap_mode_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_ap_scan_2_ap_mode_scan 1/1 Test: AP_SCAN 2 AP mode and D-Bus Scan() No dbus module available Skip test case: No dbus module available SKIP dbus_ap_scan_2_ap_mode_scan 0.082664 2022-03-29 05:41:59.075697 passed all 0 test case(s) skipped 1 test case(s) 2022-03-29 05:41:59 ./run-tests.py dbus_creds DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_creds 1/1 Test: D-Bus interworking credentials No dbus module available Skip test case: No dbus module available SKIP dbus_creds 0.080975 2022-03-29 05:41:59.322035 passed all 0 test case(s) skipped 1 test case(s) 2022-03-29 05:41:59 ./run-tests.py dbus_getall_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_getall_oom 1/1 Test: D-Bus GetAll wpa_config_get_all() OOM No dbus module available Skip test case: No dbus module available SKIP dbus_getall_oom 0.081837 2022-03-29 05:41:59.569604 passed all 0 test case(s) skipped 1 test case(s) 2022-03-29 05:41:59 ./run-tests.py dbus_introspect_busctl DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_introspect_busctl 1/1 Test: D-Bus introspection with busctl No dbus module available Skip test case: No dbus module available SKIP dbus_introspect_busctl 0.08267 2022-03-29 05:41:59.817403 passed all 0 test case(s) skipped 1 test case(s) 2022-03-29 05:41:59 ./run-tests.py dbus_remove_connected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_remove_connected 1/1 Test: D-Bus RemoveAllNetworks while connected No dbus module available Skip test case: No dbus module available SKIP dbus_remove_connected 0.085137 2022-03-29 05:42:00.062176 passed all 0 test case(s) skipped 1 test case(s) 2022-03-29 05:42:00 ./run-tests.py dbus_tdls_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_tdls_invalid 1/1 Test: D-Bus invalid TDLS operations No dbus module available Skip test case: No dbus module available SKIP dbus_tdls_invalid 0.082025 2022-03-29 05:42:00.309291 passed all 0 test case(s) skipped 1 test case(s) 2022-03-29 05:42:00 ./run-tests.py dbus_vendor_elem DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_vendor_elem 1/1 Test: D-Bus vendor element operations No dbus module available Skip test case: No dbus module available SKIP dbus_vendor_elem 0.081534 2022-03-29 05:42:00.553588 passed all 0 test case(s) skipped 1 test case(s) 2022-03-29 05:42:00 ./run-tests.py discovery_social_plus_one DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START discovery_social_plus_one 1/1 Test: P2P device discovery with social-plus-one Start autonomous GO wlan0 Wait for initial progressive find phases Verify whether the GO on non-social channel can be found PASS discovery_social_plus_one 6.464105 2022-03-29 05:42:07.183243 passed all 1 test case(s) 2022-03-29 05:42:07 ./run-tests.py dpp_config_dpp_gen_secp384r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_gen_secp384r1 1/1 Test: Generate DPP Config Object for DPP network (P-384) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_gen_secp384r1 0.18779 2022-03-29 05:42:07.534394 passed all 1 test case(s) 2022-03-29 05:42:07 ./run-tests.py dpp_config_jwk_error_no_kty DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jwk_error_no_kty 1/1 Test: DPP Config Object JWK error - no kty dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jwk_error_no_kty 2.181562 2022-03-29 05:42:09.872103 passed all 1 test case(s) 2022-03-29 05:42:09 ./run-tests.py dpp_config_jws_error_prot_hdr_no_kid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jws_error_prot_hdr_no_kid 1/1 Test: DPP Config Object JWS error - protected header - no kid dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jws_error_prot_hdr_no_kid 2.155203 2022-03-29 05:42:12.194357 passed all 1 test case(s) 2022-03-29 05:42:12 ./run-tests.py dpp_config_legacy_psk_hex DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_legacy_psk_hex 1/1 Test: DPP Config Object for legacy network using PSK dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_legacy_psk_hex 2.152489 2022-03-29 05:42:14.511518 passed all 1 test case(s) 2022-03-29 05:42:14 ./run-tests.py dpp_config_too_long_discovery_ssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_too_long_discovery_ssid 1/1 Test: DPP Config Object error - too long discovery::ssid dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_too_long_discovery_ssid 2.152347 2022-03-29 05:42:16.829662 passed all 1 test case(s) 2022-03-29 05:42:16 ./run-tests.py dpp_enterprise_tcp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_enterprise_tcp 1/1 Test: DPP over TCP for enterprise provisioning Skip test case: OpenSSL python method not available SKIP dpp_enterprise_tcp 0.081342 2022-03-29 05:42:17.076403 passed all 0 test case(s) skipped 1 test case(s) 2022-03-29 05:42:17 ./run-tests.py dpp_nfc_negotiated_handover_hostapd_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_nfc_negotiated_handover_hostapd_req 1/1 Test: DPP bootstrapping via NFC negotiated handover (hostapd as requestor) Starting AP wlan3 Generated URI[0]: DPP:C:81/6,11;M:020000000300;V:2;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgACigsASIEYl5sm5x/C4bd/yy36f/ZN+/cyvbAAF9aEM5g=;; Generated URI[1]: DPP:C:81/1,6,11;M:020000000000;V:2;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgACne+YtUgslFpgRqKPcqwTM6L0Aqih7GjlhR/t+funeE8=;; Updated local bootstrapping info: type=NFC-URI mac_addr=02:00:00:00:00:00 info= num_freq=1 use_freq=2437 curve=prime256v1 pkhash=bae82a6488eeabdb38025268c36b39f6c00eb83077da5e557565d853a3907ffd version=0 Updated URI[1]: DPP:C:81/6;M:020000000000;V:2;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgACne+YtUgslFpgRqKPcqwTM6L0Aqih7GjlhR/t+funeE8=;; PASS dpp_nfc_negotiated_handover_hostapd_req 2.656193 2022-03-29 05:42:19.897470 passed all 1 test case(s) 2022-03-29 05:42:19 ./run-tests.py dpp_pkex_nak_curve_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_nak_curve_change 1/1 Test: DPP PKEX with netAccessKey curve change Skip test case: DPP version 3 not supported SKIP dpp_pkex_nak_curve_change 0.082628 2022-03-29 05:42:20.146805 passed all 0 test case(s) skipped 1 test case(s) 2022-03-29 05:42:20 ./run-tests.py dpp_proto_auth_conf_no_i_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_conf_no_i_auth 1/1 Test: DPP protocol testing - no I-Auth in Auth Conf PASS dpp_proto_auth_conf_no_i_auth 2.139878 2022-03-29 05:42:22.451412 passed all 1 test case(s) 2022-03-29 05:42:22 ./run-tests.py dpp_proto_auth_resp_status_invalid_i_bootstrap_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_resp_status_invalid_i_bootstrap_key 1/1 Test: DPP protocol testing - invalid I-bootstrap key in Auth Resp(status) PASS dpp_proto_auth_resp_status_invalid_i_bootstrap_key 2.241371 2022-03-29 05:42:24.858758 passed all 1 test case(s) 2022-03-29 05:42:24 ./run-tests.py dpp_proto_auth_resp_status_invalid_r_bootstrap_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_resp_status_invalid_r_bootstrap_key 1/1 Test: DPP protocol testing - invalid R-bootstrap key in Auth Resp(status) PASS dpp_proto_auth_resp_status_invalid_r_bootstrap_key 2.237809 2022-03-29 05:42:27.262320 passed all 1 test case(s) 2022-03-29 05:42:27 ./run-tests.py dpp_proto_pkex_cr_req_no_i_auth_tag DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_pkex_cr_req_no_i_auth_tag 1/1 Test: DPP protocol testing - no I-Auth Tag in PKEX Commit-Reveal Request PASS dpp_proto_pkex_cr_req_no_i_auth_tag 2.11846 2022-03-29 05:42:29.545677 passed all 1 test case(s) 2022-03-29 05:42:29 ./run-tests.py dpp_uri_version DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_uri_version 1/1 Test: DPP URI version information Generated URI: DPP:V:2;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgAC82iJALWfD/NJcxkQy0DGstm+XCuLGDwJWrV/7N1tLvo=;; Parsed URI info: type=QRCODE mac_addr=00:00:00:00:00:00 info= num_freq=0 use_freq=0 curve=prime256v1 pkhash=41607d9e9abfc3788c72550602c6db222ead98b622849534222804c88b851d44 version=2 Generated URI: DPP:K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgAC65vs/83lDuaqHgFSJjndNSE+RbsoRKvFF8t7iQR98yY=;; Parsed URI info: type=QRCODE mac_addr=00:00:00:00:00:00 info= num_freq=0 use_freq=0 curve=prime256v1 pkhash=18462f11dd4d7d3865ad2ee372ca5c74d083a717d277895a1f067b26f4fbc2c6 version=0 PASS dpp_uri_version 0.084635 2022-03-29 05:42:29.793057 passed all 1 test case(s) 2022-03-29 05:42:29 ./run-tests.py eap_proto_peap_errors_server DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_peap_errors_server 1/1 Test: EAP-PEAP local error cases on server Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_peap_errors_server 2.856207 2022-03-29 05:42:32.821814 passed all 1 test case(s) 2022-03-29 05:42:32 ./run-tests.py eap_teap_basic_password_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_basic_password_auth 1/1 Test: EAP-TEAP with Basic-Password-Auth Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_basic_password_auth 1.428329 2022-03-29 05:42:34.409452 passed all 1 test case(s) 2022-03-29 05:42:34 ./run-tests.py eap_ttls_ext_cert_check DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_ttls_ext_cert_check 1/1 Test: EAP-TTLS and external server certification validation Connect STA wlan0 to AP Skip test case: OpenSSL python method not available SKIP eap_ttls_ext_cert_check 0.084781 2022-03-29 05:42:34.650157 passed all 0 test case(s) skipped 1 test case(s) 2022-03-29 05:42:34 ./run-tests.py ext_password_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ext_password_psk 1/1 Test: External password storage for PSK Starting AP wlan3 Connect STA wlan0 to AP PASS ext_password_psk 1.416559 2022-03-29 05:42:36.231487 passed all 1 test case(s) 2022-03-29 05:42:36 ./run-tests.py fils_discovery_frame DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_discovery_frame 1/1 Test: FILS Discovery frame generation Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Skip test case: FILS Discovery frame transmission not supported SKIP fils_discovery_frame 0.274558 2022-03-29 05:42:36.670534 passed all 0 test case(s) skipped 1 test case(s) 2022-03-29 05:42:36 ./run-tests.py fils_offload_to_driver2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_offload_to_driver2 1/1 Test: FILS offload to driver Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan5 to AP PASS fils_offload_to_driver2 2.053716 2022-03-29 05:42:38.890398 passed all 1 test case(s) 2022-03-29 05:42:38 ./run-tests.py fils_sk_erp_radius_ext DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_erp_radius_ext 1/1 Test: FILS SK using ERP and external RADIUS server Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_sk_erp_radius_ext 1.768821 2022-03-29 05:42:40.824599 passed all 1 test case(s) 2022-03-29 05:42:40 ./run-tests.py fst_ap_ack_response_with_session_not_set_up DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_ack_response_with_session_not_set_up 1/1 Test: FST AP ack response with session not set up Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad scenario was handled correctly (Ack response received before the session was set up) PASS fst_ap_ack_response_with_session_not_set_up 7.980945 2022-03-29 05:42:48.973220 passed all 1 test case(s) 2022-03-29 05:42:48 ./run-tests.py fst_ap_config_default DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_config_default 1/1 Test: FST AP configuration default parameters PASS fst_ap_config_default 6.544056 2022-03-29 05:42:55.680589 passed all 1 test case(s) 2022-03-29 05:42:55 ./run-tests.py fst_ap_start_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_start_session 1/1 Test: FST AP start session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Session added and set PASS fst_ap_start_session 2.876785 2022-03-29 05:42:58.721712 passed all 1 test case(s) 2022-03-29 05:42:58 ./run-tests.py fst_sta_config_pri_big DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_config_pri_big 1/1 Test: FST STA configuration Priority too large kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - try again after a second kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - could not kill the process PASS fst_sta_config_pri_big 1.303141 2022-03-29 05:43:00.183303 passed all 1 test case(s) 2022-03-29 05:43:00 ./run-tests.py fst_sta_config_pri_nan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_config_pri_nan 1/1 Test: FST STA configuration Priority not a number kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - try again after a second kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - could not kill the process PASS fst_sta_config_pri_nan 1.297145 2022-03-29 05:43:01.647063 passed all 1 test case(s) 2022-03-29 05:43:01 ./run-tests.py fst_sta_transfer_session_setup_skipped DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_transfer_session_setup_skipped 1/1 Test: FST STA transfer session - setup skipped Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Session setup skipped) PASS fst_sta_transfer_session_setup_skipped 2.90656 2022-03-29 05:43:04.718603 passed all 1 test case(s) 2022-03-29 05:43:04 ./run-tests.py gas_fragment DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_fragment 1/1 Test: GAS fragmentation Starting AP wlan3 PASS gas_fragment 0.632364 2022-03-29 05:43:05.512281 passed all 1 test case(s) 2022-03-29 05:43:05 ./run-tests.py go_search_non_social2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START go_search_non_social2 1/1 Test: P2P_FIND with freq parameter to scan a single channel (2) Start autonomous GO wlan0 PASS go_search_non_social2 3.546549 2022-03-29 05:43:09.223332 passed all 1 test case(s) 2022-03-29 05:43:09 ./run-tests.py hostapd_oom_wpa2_psk_connect DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hostapd_oom_wpa2_psk_connect 1/1 Test: hostapd failing during WPA2-PSK mode connection due to OOM Starting AP wlan3 Iteration 1 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 2 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 3 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 4 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 5 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 6 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 7 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 8 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 9 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 10 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 11 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 12 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 13 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 14 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 15 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 16 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 17 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 18 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 19 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 20 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 21 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 22 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 23 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 24 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 25 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 26 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 27 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 28 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 29 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 30 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 31 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 32 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 33 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 34 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 35 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 36 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 37 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 38 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 39 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 40 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 41 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 42 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 43 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 44 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 45 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 46 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 47 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 48 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 49 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 50 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 51 Connect STA wlan0 to AP GET_ALLOC_FAIL: 1:main Iteration 52 Connect STA wlan0 to AP GET_ALLOC_FAIL: 2:main Iteration 53 Connect STA wlan0 to AP GET_ALLOC_FAIL: 3:main Iteration 54 Connect STA wlan0 to AP GET_ALLOC_FAIL: 4:main Iteration 55 Connect STA wlan0 to AP GET_ALLOC_FAIL: 4:main PASS hostapd_oom_wpa2_psk_connect 37.604639 2022-03-29 05:43:46.988340 passed all 1 test case(s) 2022-03-29 05:43:47 ./run-tests.py ibss_rsn_eapol_trigger DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_rsn_eapol_trigger 1/1 Test: IBSS RSN and EAPOL trigger for a new peer wlan0 waiting for IBSS start/join to complete Too short EAPOL frame RSN: EAPOL frame (type 255) discarded, not a Key frame RSN: EAPOL frame payload size 96 invalid (frame size 99) RSN: EAPOL-Key type (255) unknown, discarded RSN: Timeout on waiting Authentication frame response PASS ibss_rsn_eapol_trigger 11.189529 2022-03-29 05:43:58.338834 passed all 1 test case(s) 2022-03-29 05:43:58 ./run-tests.py obss_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START obss_scan 1/1 Test: Overlapping BSS scan request Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP SIGNAL_POLL: RSSI=-30 LINKSPEED=1 NOISE=-92 FREQUENCY=2437 WIDTH=40 MHz CENTER_FRQ1=2427 AVG_RSSI=-30 Waiting for OBSS scan to occur 20/40 BSS Coexistence report received PASS obss_scan 16.493684 2022-03-29 05:44:14.996125 passed all 1 test case(s) 2022-03-29 05:44:15 ./run-tests.py p2p_channel_avoid3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_channel_avoid3 1/1 Test: P2P and avoid frequencies driver event on 5 GHz Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group Re-invoke persistent group from GO wlan0: Trying to discover peer 02:00:00:00:01:00 flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:00:00 5745 -20 [WPA2-PSK-CCMP][WPS][ESS][P2P] DIRECT-yo PASS p2p_channel_avoid3 7.576004 2022-03-29 05:44:22.736106 passed all 1 test case(s) 2022-03-29 05:44:22 ./run-tests.py p2p_go_move_scm_peer_supports DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_go_move_scm_peer_supports 1/1 Test: P2P GO move due to SCM operation preference (peer supports) Start GO negotiation wlan7 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:07:00 wlan7: Trying to discover peer 02:00:00:00:01:00 Group formed Starting AP wlan3 Connecting client to to an AP on channel 11 Connect STA wlan7 to AP Country code at the end: 00 PASS p2p_go_move_scm_peer_supports 5.890149 2022-03-29 05:44:28.791582 passed all 1 test case(s) 2022-03-29 05:44:28 ./run-tests.py p2ps_nonexact_search DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_nonexact_search 1/1 Test: P2PS nonexact seek request PASS p2ps_nonexact_search 0.436076 2022-03-29 05:44:29.392306 passed all 1 test case(s) 2022-03-29 05:44:29 ./run-tests.py p2ps_stale_group_removal DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_stale_group_removal 1/1 Test: P2PS stale group removal Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS p2ps_stale_group_removal 9.956697 2022-03-29 05:44:39.514772 passed all 1 test case(s) 2022-03-29 05:44:39 ./run-tests.py pasn_ccmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_ccmp 1/1 Test: PASN authentication with WPA2/CCMP AP Starting AP wlan3 sta: TK: 39a7110655f7d6b3c162938ea8b2ef0c KDK: ap : TK: 39a7110655f7d6b3c162938ea8b2ef0c KDK: PASS pasn_ccmp 1.078087 2022-03-29 05:44:40.756097 passed all 1 test case(s) 2022-03-29 05:44:40 ./run-tests.py pasn_fils_sha256_connected_same_channel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_fils_sha256_connected_same_channel 1/1 Test: PASN FILS authentication using SHA-256 while connected same channel Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP Starting AP wlan4 Connect STA wlan0 to AP flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:04:00 2412 -30 [ESS] open 02:00:00:00:03:00 2412 -30 [WPA2-FILS-SHA256-CCMP][ESS][FILS] fils sta: TK: 8e68a5c2145371f386d49c867b8b55c8 KDK: ap : TK: 8e68a5c2145371f386d49c867b8b55c8 KDK: PASS pasn_fils_sha256_connected_same_channel 3.763083 2022-03-29 05:44:44.687546 passed all 1 test case(s) 2022-03-29 05:44:44 ./run-tests.py pasn_gcmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_gcmp 1/1 Test: PASN authentication with WPA2/GCMP AP Starting AP wlan3 sta: TK: ed925ce12e259c1bd238616691849c19 KDK: ap : TK: ed925ce12e259c1bd238616691849c19 KDK: PASS pasn_gcmp 0.947444 2022-03-29 05:44:45.799588 passed all 1 test case(s) 2022-03-29 05:44:45 ./run-tests.py persistent_group_invite_removed_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START persistent_group_invite_removed_client 1/1 Test: P2P persistent group client removal and re-invitation Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Remove client from the group Re-invite the removed client to join the group wlan0: Trying to discover peer 02:00:00:00:01:00 Re-invite after client removed persistent group info wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 Terminate persistent group PASS persistent_group_invite_removed_client 14.569402 2022-03-29 05:45:00.537965 passed all 1 test case(s) 2022-03-29 05:45:00 ./run-tests.py persistent_group_peer_dropped2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START persistent_group_peer_dropped2 1/1 Test: P2P persistent group formation and re-invocation with peer having dropped group (2) Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group Re-invoke persistent group from GO wlan0: Trying to discover peer 02:00:00:00:01:00 Terminate persistent group Remove group on the client and try to invite from the GO wlan0: Trying to discover peer 02:00:00:00:01:00 Verify that a new group can be formed Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group PASS persistent_group_peer_dropped2 9.540776 2022-03-29 05:45:10.244965 passed all 1 test case(s) 2022-03-29 05:45:10 ./run-tests.py proxyarp_open_ebtables_ipv6 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START proxyarp_open_ebtables_ipv6 1/1 Test: ProxyARP with open network (IPv6) Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Bridge setup: bridge name bridge id STP enabled interfaces ap-br0 8000.020000000300 no wlan3 wlan4 Bridge showstp: ap-br0 bridge id 8000.020000000300 designated root 8000.020000000300 root port 0 path cost 0 max age 20.00 bridge max age 20.00 hello time 2.00 bridge hello time 2.00 forward delay 0.00 bridge forward delay 0.00 ageing time 300.00 hello timer 0.00 tcn timer 0.00 topology change timer 0.00 gc timer 297.51 flags wlan3 (1) port id 8001 state forwarding designated root 8000.020000000300 path cost 100 designated bridge 8000.020000000300 message age timer 0.00 designated port 8001 forward delay timer 0.00 designated cost 0 hold timer 0.00 flags hairpin mode 1 wlan4 (2) port id 8002 state forwarding designated root 8000.020000000300 path cost 100 designated bridge 8000.020000000300 message age timer 0.00 designated port 8002 forward delay timer 0.00 designated cost 0 hold timer 0.00 flags After connect (showmacs): port no mac addr is local? ageing timer 1 02:00:00:00:00:00 no 0.05 1 02:00:00:00:01:00 no 0.01 2 02:00:00:00:02:00 no 0.31 1 02:00:00:00:03:00 yes 0.00 1 02:00:00:00:03:00 yes 0.00 2 02:00:00:00:04:00 yes 0.00 2 02:00:00:00:04:00 yes 0.00 After connect: ['aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT', 'aaaa:bbbb:dddd::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT', 'aaaa:bbbb:eeee::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT'] After disconnect (showmacs): port no mac addr is local? ageing timer 2 02:00:00:00:02:00 no 0.95 1 02:00:00:00:03:00 yes 0.00 1 02:00:00:00:03:00 yes 0.00 2 02:00:00:00:04:00 yes 0.00 2 02:00:00:00:04:00 yes 0.00 After disconnect: [] ebtables results: Bridge table: filter Bridge chain: INPUT, entries: 0, policy: ACCEPT Bridge chain: FORWARD, entries: 4, policy: ACCEPT -p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type neighbour-solicitation -j DROP , pcnt = 16 -- bcnt = 1142-p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type neighbour-advertisement -j DROP , pcnt = 2 -- bcnt = 128-p IPv6 -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type router-solicitation -j DROP , pcnt = 0 -- bcnt = 0-p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type 143/0:255 -j DROP , pcnt = 6 -- bcnt = 456 Bridge chain: OUTPUT, entries: 4, policy: ACCEPT -p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type neighbour-solicitation -j DROP , pcnt = 3 -- bcnt = 216-p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type neighbour-advertisement -j DROP , pcnt = 1 -- bcnt = 64-p IPv6 -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type router-solicitation -j DROP , pcnt = 1 -- bcnt = 56-p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type 143/0:255 -j DROP , pcnt = 4 -- bcnt = 384 dev0 seen NS: [['33:33:ff:00:00:02', '02:00:00:00:00:00', '::', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', '02:00:00:00:00:00'], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', '02:00:00:00:00:00'], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', ''], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', ''], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', ''], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', '01:02:03:04:05:06'], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:dddd::2', '02:00:00:00:00:00']] dev0 seen NA: [] Skip test case: Assume kernel did not have the required patches for proxyarp (IPv6) SKIP proxyarp_open_ebtables_ipv6 6.949703 2022-03-29 05:45:17.360180 passed all 0 test case(s) skipped 1 test case(s) 2022-03-29 05:45:17 ./run-tests.py radius_acct_non_ascii_ssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_acct_non_ascii_ssid 1/1 Test: RADIUS Accounting and non-ASCII SSID Starting AP wlan3 Connect STA wlan0 to AP PASS radius_acct_non_ascii_ssid 1.3987 2022-03-29 05:45:18.926974 passed all 1 test case(s) 2022-03-29 05:45:18 ./run-tests.py sae_no_ffc_by_default DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_no_ffc_by_default 1/1 Test: SAE and default groups rejecting FFC Starting AP wlan3 Connect STA wlan0 to AP PASS sae_no_ffc_by_default 1.439033 2022-03-29 05:45:20.532642 passed all 1 test case(s) 2022-03-29 05:45:20 ./run-tests.py sae_pwe_group_25 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_group_25 1/1 Test: SAE PWE derivation options with group 25 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_group_25 2.541879 2022-03-29 05:45:23.242759 passed all 1 test case(s) 2022-03-29 05:45:23 ./run-tests.py scan_and_bss_entry_removed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_and_bss_entry_removed 1/1 Test: Last scan result and connect work processing on BSS entry update Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan5 to AP Connect STA wlan0 to AP Connect STA wlan5 to AP PASS scan_and_bss_entry_removed 5.210238 2022-03-29 05:45:28.618875 passed all 1 test case(s) 2022-03-29 05:45:28 ./run-tests.py scan_freq_list DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_freq_list 1/1 Test: Scan with SET freq_list and scan_cur_freq Starting AP wlan3 Connect STA wlan0 to AP PASS scan_freq_list 1.576753 2022-03-29 05:45:30.358648 passed all 1 test case(s) 2022-03-29 05:45:30 ./run-tests.py scan_hidden DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_hidden 1/1 Test: Control interface behavior on scan parameters Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS scan_hidden 1.404021 2022-03-29 05:45:31.929236 passed all 1 test case(s) 2022-03-29 05:45:31 ./run-tests.py sigma_dut_ap_ocv DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_ocv 1/1 Test: sigma_dut controlled AP using OCV Skip test case: sigma_dut not available SKIP sigma_dut_ap_ocv 0.161075 2022-03-29 05:45:32.255947 passed all 0 test case(s) skipped 1 test case(s) 2022-03-29 05:45:32 ./run-tests.py sigma_dut_dpp_qr_resp_4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_resp_4 1/1 Test: sigma_dut DPP/QR responder (conf index 4) Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_resp_4 0.082086 2022-03-29 05:45:32.503242 passed all 0 test case(s) skipped 1 test case(s) 2022-03-29 05:45:32 ./run-tests.py sigma_dut_dpp_qr_resp_chan_list DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_resp_chan_list 1/1 Test: sigma_dut DPP/QR responder (channel list override) Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_resp_chan_list 0.083398 2022-03-29 05:45:32.753086 passed all 0 test case(s) skipped 1 test case(s) 2022-03-29 05:45:32 ./run-tests.py wep_shared_key_auth_multi_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wep_shared_key_auth_multi_key 1/1 Test: WEP Shared Key authentication with multiple keys Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS wep_shared_key_auth_multi_key 3.910605 2022-03-29 05:45:36.830369 passed all 1 test case(s) 2022-03-29 05:45:36 ./run-tests.py wnm_ess_disassoc_imminent_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_ess_disassoc_imminent_pmf 1/1 Test: WNM ESS Disassociation Imminent Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_ess_disassoc_imminent_pmf 1.475747 2022-03-29 05:45:38.471243 passed all 1 test case(s) 2022-03-29 05:45:38 ./run-tests.py wpa2_ocv_sta_override_sa_query_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_sta_override_sa_query_resp 1/1 Test: OCV on 2.4 GHz and STA override SA Query Response Starting AP wlan3 Connect STA wlan0 to AP PASS wpa2_ocv_sta_override_sa_query_resp 1.427317 2022-03-29 05:45:40.064470 passed all 1 test case(s) 2022-03-29 05:45:40 ./run-tests.py wpa2_ocv_vht40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_vht40 1/1 Test: OCV with VHT40 channel Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS wpa2_ocv_vht40 16.858184 2022-03-29 05:45:57.086402 passed all 1 test case(s) 2022-03-29 05:45:57 ./run-tests.py wpas_ap_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_5ghz 1/1 Test: wpa_supplicant AP mode - 5 GHz Connect STA wlan1 to AP Wi-Fi Generation: 6 ['RSSI=-27', 'LINKSPEED=6', 'NOISE=9999', 'FREQUENCY=5180', 'WIDTH=20 MHz', 'CENTER_FRQ1=5180', 'AVG_RSSI=-27', 'AVG_BEACON_RSSI=-27'] PASS wpas_ap_5ghz 1.808344 2022-03-29 05:45:59.057461 passed all 1 test case(s) 2022-03-29 05:45:59 ./run-tests.py wpas_ap_invalid_frequency DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_invalid_frequency 1/1 Test: wpa_supplicant AP mode - invalid frequency configuration PASS wpas_ap_invalid_frequency 1.091108 2022-03-29 05:46:00.315206 passed all 1 test case(s) 2022-03-29 05:46:00 ./run-tests.py wpas_ctrl_dump DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_dump 1/1 Test: wpa_supplicant ctrl_iface and DUMP/GET global parameters Config values from DUMP: {'ctrl_interface': 'DIR=/var/run/wpa_supplicant GROUP=adm', 'ctrl_interface_group': 'null', 'eapol_version': '1', 'ap_scan': '1', 'user_mpm': '1', 'max_peer_links': '99', 'mesh_max_inactivity': '300', 'mesh_fwding': '1', 'dot11RSNASAERetransPeriod': '1000', 'disable_scan_offload': '0', 'fast_reauth': '1', 'opensc_engine_path': 'null', 'pkcs11_engine_path': 'null', 'pkcs11_module_path': 'null', 'openssl_ciphers': 'null', 'pcsc_reader': 'null', 'pcsc_pin': 'null', 'external_sim': '0', 'driver_param': 'null', 'dot11RSNAConfigPMKLifetime': '0', 'dot11RSNAConfigPMKReauthThreshold': '0', 'dot11RSNAConfigSATimeout': '0', 'update_config': '0', 'auto_uuid': '0', 'device_name': 'Device A', 'manufacturer': 'null', 'model_name': 'null', 'model_number': 'null', 'serial_number': 'null', 'config_methods': 'null', 'wps_cred_processing': '0', 'wps_cred_add_sae': '0', 'p2p_listen_reg_class': '0', 'p2p_listen_channel': '0', 'p2p_oper_reg_class': '0', 'p2p_oper_channel': '0', 'p2p_go_intent': '7', 'p2p_ssid_postfix': 'null', 'persistent_reconnect': '0', 'p2p_intra_bss': '1', 'p2p_group_idle': '0', 'p2p_go_freq_change_policy': '2', 'p2p_passphrase_len': '0', 'p2p_add_cli_chan': '0', 'p2p_optimize_listen_chan': '0', 'p2p_go_ht40': '0', 'p2p_go_vht': '0', 'p2p_go_he': '0', 'p2p_go_edmg': '0', 'p2p_disabled': '0', 'p2p_go_ctwindow': '0', 'p2p_no_group_iface': '1', 'p2p_ignore_shared_freq': '0', 'ip_addr_go': '0.0.0.0', 'ip_addr_mask': '0.0.0.0', 'ip_addr_start': '0.0.0.0', 'ip_addr_end': '0.0.0.0', 'p2p_cli_probe': '0', 'p2p_device_random_mac_addr': '0', 'p2p_interface_random_mac_addr': '0', 'p2p_6ghz_disable': '0', 'bss_max_count': '200', 'bss_expiration_age': '180', 'bss_expiration_scan_count': '2', 'filter_ssids': '0', 'filter_rssi': '0', 'max_num_sta': '128', 'ap_isolate': '0', 'disassoc_low_ack': '0', 'hs20': '1', 'interworking': '1', 'access_network_type': '15', 'go_interworking': '0', 'go_access_network_type': '0', 'go_internet': '0', 'go_venue_group': '0', 'go_venue_type': '0', 'pbc_in_m1': '0', 'autoscan': 'null', 'wps_nfc_dev_pw_id': '0', 'ext_password_backend': 'test:psk1=12345678', 'p2p_go_max_inactivity': '300', 'auto_interworking': '0', 'okc': '0', 'pmf': '0', 'sae_pwe': '0', 'sae_pmkid_in_assoc': '0', 'dtim_period': '0', 'beacon_int': '0', 'ignore_old_scan_res': '0', 'scan_cur_freq': '0', 'scan_res_valid_for_connect': '5', 'sched_scan_interval': '0', 'sched_scan_start_delay': '0', 'tdls_external_control': '0', 'osu_dir': 'null', 'wowlan_triggers': 'null', 'p2p_search_delay': '500', 'mac_addr': '0', 'rand_addr_lifetime': '60', 'preassoc_mac_addr': '0', 'key_mgmt_offload': '1', 'passive_scan': '0', 'reassoc_same_bss_optim': '0', 'wps_priority': '0', 'fst_group_id': 'null', 'fst_priority': '0', 'fst_llt': '0', 'cert_in_cb': '1', 'wpa_rsc_relaxation': '1', 'sched_scan_plans': 'null', 'non_pref_chan': 'null', 'mbo_cell_capa': '3', 'disassoc_imminent_rssi_threshold': '-75', 'oce': '1', 'gas_address3': '0', 'ftm_responder': '0', 'ftm_initiator': '0', 'gas_rand_addr_lifetime': '60', 'gas_rand_mac_addr': '0', 'dpp_config_processing': '0', 'dpp_name': 'null', 'dpp_mud_url': 'null', 'coloc_intf_reporting': '0', 'disable_btm': '0', 'extended_key_id': '0', 'wowlan_disconnect_on_deinit': '0', 'force_kdk_derivation': '0', 'pasn_corrupt_mic': '0'} PASS wpas_ctrl_dump 0.097157 2022-03-29 05:46:00.580695 passed all 1 test case(s) 2022-03-29 05:46:00 ./run-tests.py wpas_ctrl_nfc_report_handover DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_nfc_report_handover 1/1 Test: wpa_supplicant ctrl_iface NFC_REPORT_HANDOVER PASS wpas_ctrl_nfc_report_handover 0.098554 2022-03-29 05:46:00.846606 passed all 1 test case(s) 2022-03-29 05:46:00 ./run-tests.py wpas_ctrl_set_sched_scan_relative_rssi DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_set_sched_scan_relative_rssi 1/1 Test: wpa_supplicant SET relative RSSI PASS wpas_ctrl_set_sched_scan_relative_rssi 0.091065 2022-03-29 05:46:01.105130 passed all 1 test case(s) 2022-03-29 05:46:01 ./run-tests.py wpas_mesh_dynamic_interface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_mesh_dynamic_interface 1/1 Test: wpa_supplicant mesh with dynamic interface mesh0 address 42:00:00:00:00:00 mesh-wlan1-0 address 42:00:00:00:01:00 Make sure another dynamic group can be added mesh0 address 42:00:00:00:00:00 mesh-wlan1-1 address 42:00:00:00:01:00 PASS wpas_mesh_dynamic_interface 4.409458 2022-03-29 05:46:05.681986 passed all 1 test case(s) 2022-03-29 05:46:05 ./run-tests.py wps_ext_m1_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_m1_invalid 1/1 Test: WPS proto: M1 failing parsing Starting AP wlan3 PASS wps_ext_m1_invalid 1.496516 2022-03-29 05:46:07.344987 passed all 1 test case(s) 2022-03-29 05:46:07 ./run-tests.py wps_ext_m3_missing_e_hash2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_m3_missing_e_hash2 1/1 Test: WPS proto: M3 missing E-Hash2 Starting AP wlan3 PASS wps_ext_m3_missing_e_hash2 1.482163 2022-03-29 05:46:08.995390 passed all 1 test case(s) 2022-03-29 05:46:09 ./stop.sh