2022-04-07 14:56:24 export USER=root 2022-04-07 14:56:24 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2022-04-07 14:57:56 ./start.sh 2022-04-07 14:57:57 ./run-tests.py ap_ft_eap_over_ds DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_eap_over_ds 1/1 Test: WPA2-EAP-FT AP using over-the-DS Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_eap_over_ds 0.971489 2022-04-07 14:57:59.256267 passed all 1 test case(s) 2022-04-07 14:57:59 ./run-tests.py ap_ft_extra_ie DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_extra_ie 1/1 Test: WPA2-PSK-FT AP with WPA2-PSK enabled and unexpected MDE Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP PASS ap_ft_extra_ie 0.455827 2022-04-07 14:57:59.925630 passed all 1 test case(s) 2022-04-07 14:57:59 ./run-tests.py ap_ft_invalid_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_invalid_resp 1/1 Test: WPA2-PSK-FT AP and invalid response IEs Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_ft_invalid_resp 1.931795 2022-04-07 14:58:02.068034 passed all 1 test case(s) 2022-04-07 14:58:02 ./run-tests.py ap_ft_over_ds_pull DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_over_ds_pull 1/1 Test: WPA2-PSK-FT AP over DS (pull PMK) Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_over_ds_pull 0.751266 2022-04-07 14:58:03.026281 passed all 1 test case(s) 2022-04-07 14:58:03 ./run-tests.py ap_ft_pmf_required_over_ds DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_pmf_required_over_ds 1/1 Test: WPA2-PSK-FT AP with PMF required on STA (over DS) Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_pmf_required_over_ds 0.791458 2022-04-07 14:58:04.023433 passed all 1 test case(s) 2022-04-07 14:58:04 ./run-tests.py ap_ft_reassoc_replay DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_reassoc_replay 1/1 Test: WPA2-PSK-FT AP and replayed Reassociation Request frame Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Replay the last Reassociation Request frame CCMP PN: ['0x000000000001', '0x000000000002'] PASS ap_ft_reassoc_replay 0.952483 2022-04-07 14:58:05.181551 passed all 1 test case(s) 2022-04-07 14:58:05 ./run-tests.py ap_ft_sae_over_ds_ptk_rekey1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_sae_over_ds_ptk_rekey1 1/1 Test: WPA2-PSK-FT-SAE AP over DS and PTK rekey triggered by station Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP PASS ap_ft_sae_over_ds_ptk_rekey1 1.615713 2022-04-07 14:58:07.002780 passed all 1 test case(s) 2022-04-07 14:58:07 ./run-tests.py ap_hs20_remediation_sql DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_remediation_sql 1/1 Test: Hotspot 2.0 connection and remediation required using SQLite for user DB Starting AP wlan4 Starting AP wlan3 PASS ap_hs20_remediation_sql 0.450384 2022-04-07 14:58:07.659274 passed all 1 test case(s) 2022-04-07 14:58:07 ./run-tests.py ap_hs20_req_roaming_consortium DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_req_roaming_consortium 1/1 Test: Hotspot 2.0 required roaming consortium Starting AP wlan3 Starting AP wlan4 Verify network selection to AP wlan4 Verify network selection to AP wlan3 PASS ap_hs20_req_roaming_consortium 0.550794 2022-04-07 14:58:08.414120 passed all 1 test case(s) 2022-04-07 14:58:08 ./run-tests.py ap_hs20_unexpected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_unexpected 1/1 Test: Unexpected Hotspot 2.0 AP configuration Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_hs20_unexpected 1.545439 2022-04-07 14:58:10.164314 passed all 1 test case(s) 2022-04-07 14:58:10 ./run-tests.py ap_ht_20_to_40_csa DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht_20_to_40_csa 1/1 Test: HT with 20 MHz channel width doing CSA to 40 MHz Starting AP wlan3 Connect STA wlan0 to AP SIGNAL_POLL: RSSI=-30 LINKSPEED=1 NOISE=9999 FREQUENCY=2412 WIDTH=20 MHz CENTER_FRQ1=2412 AVG_RSSI=-30 AVG_BEACON_RSSI=-30 SIGNAL_POLL: RSSI=-30 LINKSPEED=104 NOISE=9999 FREQUENCY=2462 WIDTH=40 MHz CENTER_FRQ1=2452 AVG_RSSI=-30 AVG_BEACON_RSSI=-30 PASS ap_ht_20_to_40_csa 1.018797 2022-04-07 14:58:11.387321 passed all 1 test case(s) 2022-04-07 14:58:11 ./run-tests.py ap_open_multicast_to_unicast_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_multicast_to_unicast_disabled 1/1 Test: Multicast-to-unicast conversion disabled Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_multicast_to_unicast_disabled 0.263414 2022-04-07 14:58:11.857200 passed all 1 test case(s) 2022-04-07 14:58:11 ./run-tests.py ap_open_reassoc_not_found DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_reassoc_not_found 1/1 Test: AP with open mode and REASSOCIATE not finding a match Connect STA wlan0 to AP PASS ap_open_reassoc_not_found 0.261278 2022-04-07 14:58:12.323882 passed all 1 test case(s) 2022-04-07 14:58:12 ./run-tests.py ap_open_reassoc_same DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_reassoc_same 1/1 Test: AP with open mode and STA reassociating back to same AP without auth exchange Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_reassoc_same 0.286439 2022-04-07 14:58:12.817467 passed all 1 test case(s) 2022-04-07 14:58:12 ./run-tests.py ap_pmf_assoc_comeback3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_assoc_comeback3 1/1 Test: WPA2-PSK AP with PMF association comeback (using radio_disabled) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_assoc_comeback3 1.463907 2022-04-07 14:58:14.486958 passed all 1 test case(s) 2022-04-07 14:58:14 ./run-tests.py ap_pmf_assoc_comeback_wps DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_assoc_comeback_wps 1/1 Test: WPA2-PSK AP with PMF association comeback (WPS) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_assoc_comeback_wps 1.640548 2022-04-07 14:58:16.331121 passed all 1 test case(s) 2022-04-07 14:58:16 ./run-tests.py ap_pmf_tkip_reject DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_tkip_reject 1/1 Test: Mixed mode BSS and MFP-enabled AP rejecting TKIP Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_pmf_tkip_reject 0.912707 2022-04-07 14:58:17.449741 passed all 1 test case(s) 2022-04-07 14:58:17 ./run-tests.py ap_wpa2_eap_fast_binary_pac DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_binary_pac 1/1 Test: WPA2-Enterprise connection using EAP-FAST and binary PAC format Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_binary_pac 0.600342 2022-04-07 14:58:18.253921 passed all 1 test case(s) 2022-04-07 14:58:18 ./run-tests.py ap_wpa2_eap_peap_eap_gtc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_peap_eap_gtc 1/1 Test: WPA2-Enterprise connection using EAP-PEAP/EAP-GTC Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_peap_eap_gtc 0.287296 2022-04-07 14:58:18.743814 passed all 1 test case(s) 2022-04-07 14:58:18 ./run-tests.py ap_wpa2_eap_sim_ext_replace_sim DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sim_ext_replace_sim 1/1 Test: EAP-SIM with external GSM auth and replacing SIM without clearing pseudonym id Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_sim_ext_replace_sim 0.32981 2022-04-07 14:58:19.277328 passed all 1 test case(s) 2022-04-07 14:58:19 ./run-tests.py ap_wpa2_eap_status DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_status 1/1 Test: EAP state machine status information Starting AP wlan3 Connect STA wlan0 to AP Iterations: 276 EAP states: ['DISABLED', 'IDLE', 'SUCCESS'] methodStates: ['DONE', 'NONE', 'MAY_CONT'] decisions: ['FAIL', 'UNCOND_SUCC'] reqMethods: ['0', '1', '21', '25'] selectedMethods: ['18 (EAP-SIM)', '25 (EAP-PEAP)'] PASS ap_wpa2_eap_status 0.282207 2022-04-07 14:58:19.762729 passed all 1 test case(s) 2022-04-07 14:58:19 ./run-tests.py ap_wpa2_eap_tls_check_crl_not_strict DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_check_crl_not_strict 1/1 Test: EAP-TLS and server checking CRL with check_crl_strict=0 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_check_crl_not_strict 0.40783 2022-04-07 14:58:20.376850 passed all 1 test case(s) 2022-04-07 14:58:20 ./run-tests.py ap_wpa2_eap_ttls_optional_ocsp_unknown DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_optional_ocsp_unknown 1/1 Test: WPA2-Enterprise connection using EAP-TTLS and OCSP status unknown openssl ocsp -index auth_serv/index-unknown.txt -rsigner auth_serv/ocsp-responder.pem -rkey auth_serv/ocsp-responder.key -CA auth_serv/ca.pem -issuer auth_serv/ca.pem -verify_other auth_serv/ca.pem -trust_other -ndays 7 -reqin auth_serv/ocsp-req.der -respout logs/current/ocsp-server-cache-unknown.der openssl result: Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_optional_ocsp_unknown 0.276982 2022-04-07 14:58:20.857452 passed all 1 test case(s) 2022-04-07 14:58:20 ./run-tests.py ap_wpa2_psk_ext_eapol_key_info DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ext_eapol_key_info 1/1 Test: WPA2-PSK 4-way handshake with strange key info values Starting AP wlan3 Connect STA wlan0 to AP Send EAPOL-Key msg 2/4 Send EAPOL-Key msg 4/4 PASS ap_wpa2_psk_ext_eapol_key_info 0.221111 2022-04-07 14:58:21.282931 passed all 1 test case(s) 2022-04-07 14:58:21 ./run-tests.py ap_wpa2_psk_supp_proto_gtk_keyidx_0_and_3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_supp_proto_gtk_keyidx_0_and_3 1/1 Test: WPA2-PSK supplicant protocol testing: GTK key index 0 and 3 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_supp_proto_gtk_keyidx_0_and_3 0.254131 2022-04-07 14:58:21.739762 passed all 1 test case(s) 2022-04-07 14:58:21 ./run-tests.py ap_wpa_psk_rsn_pairwise DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa_psk_rsn_pairwise 1/1 Test: WPA-PSK AP and only rsn_pairwise set Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa_psk_rsn_pairwise 0.255297 2022-04-07 14:58:22.201174 passed all 1 test case(s) 2022-04-07 14:58:22 ./run-tests.py ap_wps_ap_scan_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_ap_scan_2 1/1 Test: AP_SCAN 2 for WPS Starting AP wlan3 PASS ap_wps_ap_scan_2 0.61602 2022-04-07 14:58:23.021761 passed all 1 test case(s) 2022-04-07 14:58:23 ./run-tests.py ap_wps_er_http_proto_event_sub_url_dns DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto_event_sub_url_dns 1/1 Test: WPS ER HTTP protocol testing - DNS name in eventSubURL HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" PASS ap_wps_er_http_proto_event_sub_url_dns 1.098049 2022-04-07 14:58:24.326097 passed all 1 test case(s) 2022-04-07 14:58:24 ./run-tests.py ap_wps_m2_dev_passwd_id_change_pin_to_pbc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_m2_dev_passwd_id_change_pin_to_pbc 1/1 Test: WPS and M2 with different Device Password ID (PIN to PBC) Starting AP wlan3 PASS ap_wps_m2_dev_passwd_id_change_pin_to_pbc 0.251129 2022-04-07 14:58:24.784201 passed all 1 test case(s) 2022-04-07 14:58:24 ./run-tests.py ap_wps_new_version_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_new_version_sta 1/1 Test: WPS compatibility with new version number on the station Starting AP wlan3 WPS provisioning step PASS ap_wps_new_version_sta 0.353865 2022-04-07 14:58:25.368867 passed all 1 test case(s) 2022-04-07 14:58:25 ./run-tests.py ap_wps_wep DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_wep 1/1 Test: WPS AP trying to enable WEP Starting AP wlan3 PASS ap_wps_wep 0.134615 2022-04-07 14:58:25.708248 passed all 1 test case(s) 2022-04-07 14:58:25 ./run-tests.py bgscan_reconfig DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START bgscan_reconfig 1/1 Test: bgscan parameter update Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS bgscan_reconfig 0.231257 2022-04-07 14:58:26.143571 passed all 1 test case(s) 2022-04-07 14:58:26 ./run-tests.py bgscan_simple_beacon_loss DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START bgscan_simple_beacon_loss 1/1 Test: bgscan_simple and beacon loss Starting AP wlan3 Connect STA wlan0 to AP PASS bgscan_simple_beacon_loss 1.858129 2022-04-07 14:58:28.209112 passed all 1 test case(s) 2022-04-07 14:58:28 ./run-tests.py bgscan_simple_scanning DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START bgscan_simple_scanning 1/1 Test: bgscan_simple and scanning behavior Starting AP wlan3 Connect STA wlan0 to AP PASS bgscan_simple_scanning 11.430641 2022-04-07 14:58:39.847671 passed all 1 test case(s) 2022-04-07 14:58:39 ./run-tests.py both_go_neg_display DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START both_go_neg_display 1/1 Test: P2P GO Negotiation with both devices trying to display PIN Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 PASS both_go_neg_display 1.602046 2022-04-07 14:58:41.654165 passed all 1 test case(s) 2022-04-07 14:58:41 ./run-tests.py connect_cmd_reject_assoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START connect_cmd_reject_assoc 1/1 Test: Connection using cfg80211 connect command getting rejected Starting AP wlan3 Connect STA wlan5 to AP PASS connect_cmd_reject_assoc 0.225407 2022-04-07 14:58:42.085270 passed all 1 test case(s) 2022-04-07 14:58:42 ./run-tests.py dbus_while_not_connected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_while_not_connected 1/1 Test: D-Bus invalid operations while not connected No dbus module available Skip test case: No dbus module available SKIP dbus_while_not_connected 0.089355 2022-04-07 14:58:42.378156 passed all 0 test case(s) skipped 1 test case(s) 2022-04-07 14:58:42 ./run-tests.py discovery_ctrl_char_in_devname DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START discovery_ctrl_char_in_devname 1/1 Test: P2P device discovery and control character in Device Name wlan1: Trying to discover peer 02:00:00:00:00:00 wlan2: Trying to discover peer 02:00:00:00:01:00 Terminate persistent group wlan2: Trying to discover peer 02:00:00:00:01:00 PASS discovery_ctrl_char_in_devname 1.248282 2022-04-07 14:58:43.834457 passed all 1 test case(s) 2022-04-07 14:58:43 ./run-tests.py dpp_bootstrap_key_autogen_issues DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_bootstrap_key_autogen_issues 1/1 Test: DPP bootstrap key autogen issues dev0 displays QR Code dev1 scans QR Code dev1 initiates DPP Authentication PASS dpp_bootstrap_key_autogen_issues 0.124654 2022-04-07 14:58:44.162582 passed all 1 test case(s) 2022-04-07 14:58:44 ./run-tests.py dpp_config_dpp_gen_secp521r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_gen_secp521r1 1/1 Test: Generate DPP Config Object for DPP network (P-521) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_gen_secp521r1 0.116383 2022-04-07 14:58:44.482366 passed all 1 test case(s) 2022-04-07 14:58:44 ./run-tests.py dpp_config_error_legacy_too_short_pass DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_error_legacy_too_short_pass 1/1 Test: DPP Config Object legacy error - too short pass/psk dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_error_legacy_too_short_pass 0.107208 2022-04-07 14:58:44.797686 passed all 1 test case(s) 2022-04-07 14:58:44 ./run-tests.py dpp_config_jwk_error_unexpected_kty DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jwk_error_unexpected_kty 1/1 Test: DPP Config Object JWK error - unexpected kty dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jwk_error_unexpected_kty 0.112215 2022-04-07 14:58:45.116730 passed all 1 test case(s) 2022-04-07 14:58:45 ./run-tests.py dpp_config_jws_error_prot_hdr_unexpected_alg DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jws_error_prot_hdr_unexpected_alg 1/1 Test: DPP Config Object JWS error - protected header - unexpected alg dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jws_error_prot_hdr_unexpected_alg 0.112098 2022-04-07 14:58:45.431194 passed all 1 test case(s) 2022-04-07 14:58:45 ./run-tests.py dpp_invalid_legacy_params2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_invalid_legacy_params2 1/1 Test: DPP invalid legacy parameters 2 PASS dpp_invalid_legacy_params2 0.09536 2022-04-07 14:58:45.733879 passed all 1 test case(s) 2022-04-07 14:58:45 ./run-tests.py dpp_pkex_curve_mismatch_failure2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_curve_mismatch_failure2 1/1 Test: DPP and PKEX with mismatching curve (local failure 2) PASS dpp_pkex_curve_mismatch_failure2 2.105813 2022-04-07 14:58:48.045572 passed all 1 test case(s) 2022-04-07 14:58:48 ./run-tests.py dpp_pkex_hostapd_initiator_no_response DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_hostapd_initiator_no_response 1/1 Test: DPP PKEX with hostapd as initiator and no response Starting AP wlan3 PASS dpp_pkex_hostapd_initiator_no_response 10.128217 2022-04-07 14:58:58.378217 passed all 1 test case(s) 2022-04-07 14:58:58 ./run-tests.py dpp_proto_auth_conf_no_r_bootstrap_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_conf_no_r_bootstrap_key 1/1 Test: DPP protocol testing - no R-bootstrap key in Auth Conf PASS dpp_proto_auth_conf_no_r_bootstrap_key 0.100737 2022-04-07 14:58:58.685369 passed all 1 test case(s) 2022-04-07 14:58:58 ./run-tests.py dpp_proto_zero_i_capab DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_zero_i_capab 1/1 Test: DPP protocol testing - zero I-capability in Auth Req PASS dpp_proto_zero_i_capab 0.199023 2022-04-07 14:58:59.087884 passed all 1 test case(s) 2022-04-07 14:58:59 ./run-tests.py dpp_qr_code_curves_brainpool DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_curves_brainpool 1/1 Test: DPP QR Code and supported Brainpool curves PASS dpp_qr_code_curves_brainpool 0.089036 2022-04-07 14:58:59.380012 passed all 1 test case(s) 2022-04-07 14:58:59 ./run-tests.py dpp_tcp_port DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_tcp_port 1/1 Test: DPP over TCP and specified port PASS dpp_tcp_port 1.614039 2022-04-07 14:59:01.198939 passed all 1 test case(s) 2022-04-07 14:59:01 ./run-tests.py eap_fast_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_fast_proto 1/1 Test: EAP-FAST Phase protocol testing Starting AP wlan3 Connect STA wlan0 to AP eap_handler - RX 023c00090146415354 Send EAP-FAST/Start eap_handler - RX 020200782b01160301006d010000690303f5ca38f0b61bb5d6ac3240460577a090e471fa9a14e3403779c4811aeacab74a000004003400ff0100003c0016000000170000000d0030002e040305030603080708080809080a080b080408050806040105010601030302030301020103020202040205020602 EAP-FAST: TLS processing failed PASS eap_fast_proto 5.460705 2022-04-07 14:59:06.863933 passed all 1 test case(s) 2022-04-07 14:59:06 ./run-tests.py eap_proto_expanded DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_expanded 1/1 Test: EAP protocol tests with expanded header Starting AP wlan3 Running connection iteration 1 Connect STA wlan0 to AP expanded_handler - RX 02c600090175736572 Test: MD5 challenge in expanded header expanded_handler - RX 020200160410637490d2163436281e945bd2527b4b4a Running connection iteration 2 Connect STA wlan0 to AP expanded_handler - RX 023900090175736572 Test: Invalid expanded EAP length expanded_handler - RX 02040014fe00000000000003fe00000000000004 Running connection iteration 3 Connect STA wlan0 to AP expanded_handler - RX 02f300090175736572 Test: Invalid expanded frame type expanded_handler - RX 02060014fe00000000000003fe00000000000004 Running connection iteration 4 Connect STA wlan0 to AP expanded_handler - RX 027200090175736572 Test: MSCHAPv2 Challenge expanded_handler - RX 0208003f1a0200003a31d76b25505805fcc581e02f6871a70ec00000000000000000134bbd6fd15e8d69904b52f461ab0bdc7e3bd36203d7b4ad0075736572 Test: Invalid expanded frame type Running connection iteration 5 Connect STA wlan0 to AP expanded_handler - RX 02dc00090175736572 No more test responses available - test case completed PASS eap_proto_expanded 0.679182 2022-04-07 14:59:07.749186 passed all 1 test case(s) 2022-04-07 14:59:07 ./run-tests.py fils_sk_hlp_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_hlp_oom 1/1 Test: FILS SK HLP and hostapd OOM Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP Connection timed out Traceback (most recent call last): File "./run-tests.py", line 531, in main t(dev, apdev, params) File "/lkp/benchmarks/hwsim/tests/hwsim/test_fils.py", line 919, in test_fils_sk_hlp_oom dev[0].wait_connected() File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1411, in wait_connected raise Exception(error) Exception: Connection timed out FAIL fils_sk_hlp_oom 10.282646 2022-04-07 14:59:18.241254 passed 0 test case(s) skipped 0 test case(s) failed tests: fils_sk_hlp_oom 2022-04-07 14:59:18 ./run-tests.py fils_sk_sha384_full_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_sha384_full_auth 1/1 Test: FILS SK full authentication (SHA384) Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_sk_sha384_full_auth 1.260241 2022-04-07 14:59:19.710843 passed all 1 test case(s) 2022-04-07 14:59:19 ./run-tests.py fst_ap_session_response_accept_with_no_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_session_response_accept_with_no_session 1/1 Test: FST AP session response accept with no session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Frame was ignored (Session Response) PASS fst_ap_session_response_accept_with_no_session 5.567431 2022-04-07 14:59:25.483359 passed all 1 test case(s) 2022-04-07 14:59:25 ./run-tests.py gas_anqp_address3_ap_forced DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_address3_ap_forced 1/1 Test: GAS/ANQP query using IEEE 802.11 compliant Address 3 value on AP Starting AP wlan3 PASS gas_anqp_address3_ap_forced 0.643818 2022-04-07 14:59:26.331966 passed all 1 test case(s) 2022-04-07 14:59:26 ./run-tests.py grpform_force_chan_cli DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_force_chan_cli 1/1 Test: P2P group formation forced channel selection by client Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS grpform_force_chan_cli 0.858746 2022-04-07 14:59:27.396822 passed all 1 test case(s) 2022-04-07 14:59:27 ./run-tests.py grpform_not_ready DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_not_ready 1/1 Test: Not ready for GO Negotiation (listen) wlan1: Trying to discover peer 02:00:00:00:00:00 wlan2: Trying to discover peer 02:00:00:00:00:00 PASS grpform_not_ready 5.606286 2022-04-07 14:59:33.210385 passed all 1 test case(s) 2022-04-07 14:59:33 ./run-tests.py grpform_random_addr DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_random_addr 1/1 Test: P2P group formation with random interface addresses Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS grpform_random_addr 11.045342 2022-04-07 14:59:44.459964 passed all 1 test case(s) 2022-04-07 14:59:44 ./run-tests.py hapd_ctrl_set_error_cases DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_set_error_cases 1/1 Test: hostapd and SET error cases Starting AP wlan3 PASS hapd_ctrl_set_error_cases 0.175036 2022-04-07 14:59:44.841146 passed all 1 test case(s) 2022-04-07 14:59:44 ./run-tests.py he_on_24ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_on_24ghz 1/1 Test: Subset of HE features on 2.4 GHz Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS he_on_24ghz 0.527649 2022-04-07 14:59:45.572708 passed all 1 test case(s) 2022-04-07 14:59:45 ./run-tests.py ieee8021x_set_conf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_set_conf 1/1 Test: IEEE 802.1X and EAPOL_SET command Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_set_conf 0.394811 2022-04-07 14:59:46.170834 passed all 1 test case(s) 2022-04-07 14:59:46 ./run-tests.py kernel_bss_leak_timeout DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START kernel_bss_leak_timeout 1/1 Test: cfg80211/mac80211 BSS leak on timeout Starting AP wlan3 Connect STA wlan0 to AP PASS kernel_bss_leak_timeout 0.350736 2022-04-07 14:59:46.724756 passed all 1 test case(s) 2022-04-07 14:59:46 ./run-tests.py owe_sa_query DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START owe_sa_query 1/1 Test: Opportunistic Wireless Encryption - SA Query Starting AP wlan3 Connect STA wlan0 to AP PASS owe_sa_query 1.436509 2022-04-07 14:59:48.368236 passed all 1 test case(s) 2022-04-07 14:59:48 ./run-tests.py p2p_device_grpform_no_group_iface2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_device_grpform_no_group_iface2 1/1 Test: P2P group formation with driver using cfg80211 P2P Device but no separate group interface (reverse) Start GO negotiation wlan7 -> wlan0 wlan0: Trying to discover peer 42:00:00:00:07:00 wlan7: Trying to discover peer 02:00:00:00:00:00 Group formed PASS p2p_device_grpform_no_group_iface2 1.01469 2022-04-07 14:59:49.587685 passed all 1 test case(s) 2022-04-07 14:59:49 ./run-tests.py p2p_ext_vendor_elem_assoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_ext_vendor_elem_assoc 1/1 Test: VENDOR_ELEM in Association frames wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 PASS p2p_ext_vendor_elem_assoc 2.334516 2022-04-07 14:59:52.126942 passed all 1 test case(s) 2022-04-07 14:59:52 ./run-tests.py p2p_go_invite_unknown DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_go_invite_unknown 1/1 Test: P2P GO inviting a client that has not discovered the GO wlan0: Trying to discover peer 02:00:00:00:01:00 Invite peer to join the group PASS p2p_go_invite_unknown 0.411655 2022-04-07 14:59:52.743635 passed all 1 test case(s) 2022-04-07 14:59:52 ./run-tests.py p2p_service_discovery_req_cancel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_service_discovery_req_cancel 1/1 Test: Cancel a P2P service discovery request PASS p2p_service_discovery_req_cancel 0.091746 2022-04-07 14:59:53.043830 passed all 1 test case(s) 2022-04-07 14:59:53 ./run-tests.py p2ps_active_go_seeker DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_active_go_seeker 1/1 Test: P2PS connection with P2PS method - active GO on seeker PASS p2ps_active_go_seeker 0.844369 2022-04-07 14:59:54.094595 passed all 1 test case(s) 2022-04-07 14:59:54 ./run-tests.py p2ps_connect_keypad_method_autoaccept DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_connect_keypad_method_autoaccept 1/1 Test: P2PS connection with auto-accept and keypad method on seeker side PASS p2ps_connect_keypad_method_autoaccept 0.619708 2022-04-07 14:59:54.919749 passed all 1 test case(s) 2022-04-07 14:59:54 ./run-tests.py pasn_group_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_group_mismatch 1/1 Test: PASN authentication with WPA2/CCMP AP with group mismatch Starting AP wlan3 PASS pasn_group_mismatch 0.286629 2022-04-07 14:59:55.414130 passed all 1 test case(s) 2022-04-07 14:59:55 ./run-tests.py radius_psk_reject DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_psk_reject 1/1 Test: WPA2 with PSK from RADIUS and reject Starting AP wlan3 Connect STA wlan0 to AP Received authentication request PASS radius_psk_reject 1.259606 2022-04-07 14:59:56.877587 passed all 1 test case(s) 2022-04-07 14:59:56 ./run-tests.py rrm_beacon_req_active DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_active 1/1 Test: Beacon request - active scan mode Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Received beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=3142791399 frame_body=e73053bb11dc050064000114000372726d010882848b960c1218240301012a010432043048606c460570000000003b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00 fragment_id=0100 Received beacon report: opclass=81 channel=11 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:04:00 antenna_id=0 parent_tsf=3142791397 frame_body=e53053bb11dc0500640001040007616e6f74686572010882848b960c12182403010b2a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d160b0000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00 fragment_id=0100 PASS rrm_beacon_req_active 1.969732 2022-04-07 14:59:59.057543 passed all 1 test case(s) 2022-04-07 14:59:59 ./run-tests.py rrm_beacon_req_table_bssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_table_bssid 1/1 Test: Beacon request - beacon table mode - specific BSSID Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Received beacon report: opclass=81 channel=1 start=0 duration=0 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:04:00 antenna_id=0 parent_tsf=0 frame_body=bbdc59bb11dc0500640001040007616e6f74686572010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00 fragment_id=0100 PASS rrm_beacon_req_table_bssid 0.367245 2022-04-07 14:59:59.633508 passed all 1 test case(s) 2022-04-07 14:59:59 ./run-tests.py sae_pk_group_negotiation DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_group_negotiation 1/1 Test: SAE-PK Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pk_group_negotiation 0.362124 2022-04-07 15:00:00.204879 passed all 1 test case(s) 2022-04-07 15:00:00 ./run-tests.py scan_bss_operations DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_bss_operations 1/1 Test: Control interface behavior on BSS parameters Starting AP wlan3 Starting AP wlan4 PASS scan_bss_operations 0.375412 2022-04-07 15:00:00.795509 passed all 1 test case(s) 2022-04-07 15:00:00 ./run-tests.py scan_multiple_mbssid_ie DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multiple_mbssid_ie 1/1 Test: Transmitting BSS has 2 MBSSID IE bssid: 02:00:00:00:03:00 Starting AP wlan3 AP 02:00:00:00:03:00: {'id': '62', 'bssid': '02:00:00:00:03:00', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0401', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1649343601163081', 'age': '0', 'ie': '000b7472616e736d6974746564010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00470d02000a53020100000131550101470d02000a53020200000132550102', 'flags': '[ESS]', 'ssid': 'transmitted', 'snr': '59', 'est_throughput': '65000', 'update_idx': '109', 'beacon_ie': '000b7472616e736d6974746564010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00470d02000a53020100000131550101470d02000a53020200000132550102'} AP 02:00:00:00:03:01: {'id': '63', 'bssid': '02:00:00:00:03:01', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0001', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1649343601163081', 'age': '0', 'ie': '000131010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550101', 'flags': '[ESS]', 'ssid': '1', 'snr': '59', 'est_throughput': '65000', 'update_idx': '109', 'beacon_ie': '000131010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550101'} AP 02:00:00:00:03:02: {'id': '64', 'bssid': '02:00:00:00:03:02', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0002', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1649343601163081', 'age': '0', 'ie': '000132010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550102', 'flags': '[IBSS]', 'ssid': '2', 'snr': '59', 'est_throughput': '65000', 'update_idx': '109', 'beacon_ie': '000132010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550102'} PASS scan_multiple_mbssid_ie 0.292023 2022-04-07 15:00:01.317470 passed all 1 test case(s) 2022-04-07 15:00:01 ./run-tests.py scan_specify_ssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_specify_ssid 1/1 Test: Control interface behavior on scan SSID parameter Starting AP wlan3 PASS scan_specify_ssid 0.433241 2022-04-07 15:00:01.962774 passed all 1 test case(s) 2022-04-07 15:00:02 ./run-tests.py sigma_dut_sae_password DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_sae_password 1/1 Test: sigma_dut controlled SAE association and long password Skip test case: sigma_dut not available SKIP sigma_dut_sae_password 0.097384 2022-04-07 15:00:02.277508 passed all 0 test case(s) skipped 1 test case(s) 2022-04-07 15:00:02 ./run-tests.py suite_b_192_mic_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START suite_b_192_mic_failure 1/1 Test: WPA2/GCMP connection at Suite B 192-bit level and MIC derivation failure Starting AP wlan3 Connect STA wlan0 to AP PASS suite_b_192_mic_failure 0.411005 2022-04-07 15:00:02.904172 passed all 1 test case(s) 2022-04-07 15:00:02 ./run-tests.py wnm_bss_tm DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm 1/1 Test: WNM BSS Transition Management Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 No neighbor list entries Neighbor list entry, but not claimed as Preferred Candidate List Preferred Candidate List (no matching neighbor) without Disassociation Imminent Preferred Candidate List (matching neighbor for another BSS) without Disassociation Imminent Preferred Candidate List with two matches, no roam needed Preferred Candidate List with two matches and extra frequency (160 MHz), no roam needed PASS wnm_bss_tm 2.797829 2022-04-07 15:00:05.920460 passed all 1 test case(s) 2022-04-07 15:00:05 ./run-tests.py wnm_disassoc_imminent DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_disassoc_imminent 1/1 Test: WNM Disassociation Imminent Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_disassoc_imminent 0.285531 2022-04-07 15:00:06.419050 passed all 1 test case(s) 2022-04-07 15:00:06 ./run-tests.py wnm_sleep_mode_rsn_ocv_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_sleep_mode_rsn_ocv_failure 1/1 Test: WNM Sleep Mode - RSN with OCV - local failure Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_sleep_mode_rsn_ocv_failure 0.336408 2022-04-07 15:00:06.972494 passed all 1 test case(s) 2022-04-07 15:00:07 ./run-tests.py wpa2_ocv_ap_override_eapol_m3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_ap_override_eapol_m3 1/1 Test: OCV on 2.4 GHz and AP override EAPOL-Key msg 3/4 Starting AP wlan3 Connect STA wlan0 to AP PASS wpa2_ocv_ap_override_eapol_m3 3.352606 2022-04-07 15:00:10.546016 passed all 1 test case(s) 2022-04-07 15:00:10 ./run-tests.py wpas_ap_global_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_global_sta 1/1 Test: wpa_supplicant AP mode - STA commands on global control interface Connect STA wlan1 to AP PASS wpas_ap_global_sta 0.278452 2022-04-07 15:00:11.045615 passed all 1 test case(s) 2022-04-07 15:00:11 ./run-tests.py wpas_ctrl_data_test DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_data_test 1/1 Test: wpa_supplicant ctrl_iface DATA_TEST PASS wpas_ctrl_data_test 0.131562 2022-04-07 15:00:11.394618 passed all 1 test case(s) 2022-04-07 15:00:11 ./run-tests.py wpas_ctrl_nfc_tag_read DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_nfc_tag_read 1/1 Test: wpa_supplicant ctrl_iface WPS_NFC_TAG_READ PASS wpas_ctrl_nfc_tag_read 0.095296 2022-04-07 15:00:11.699116 passed all 1 test case(s) 2022-04-07 15:00:11 ./run-tests.py wpas_mesh_max_peering DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_mesh_max_peering 1/1 Test: Mesh max peering limit one: [1, 3, 2] zero: [2, 0, 0] PASS wpas_mesh_max_peering 3.894197 2022-04-07 15:00:15.806195 passed all 1 test case(s) 2022-04-07 15:00:15 ./run-tests.py wpas_mesh_peer_connected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_mesh_peer_connected 1/1 Test: wpa_supplicant MESH peer connected PASS wpas_mesh_peer_connected 0.22406 2022-04-07 15:00:16.308645 passed all 1 test case(s) 2022-04-07 15:00:16 ./run-tests.py wpas_mesh_peer_disconnected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_mesh_peer_disconnected 1/1 Test: wpa_supplicant MESH peer disconnected PASS wpas_mesh_peer_disconnected 0.679062 2022-04-07 15:00:17.204234 passed all 1 test case(s) 2022-04-07 15:00:17 ./stop.sh