2022-04-29 06:48:12 export USER=root 2022-04-29 06:48:12 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2022-04-29 06:48:59 ./start.sh 2022-04-29 06:48:59 ./run-tests.py ap_acs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_acs 1/1 Test: Automatic channel selection Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_acs 6.86897 2022-04-29 06:49:07.509591 passed all 1 test case(s) 2022-04-29 06:49:07 ./run-tests.py ap_acs_40mhz_plus_or_minus DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_acs_40mhz_plus_or_minus 1/1 Test: Automatic channel selection for 40 MHz channel (plus or minus) Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_acs_40mhz_plus_or_minus 8.427801 2022-04-29 06:49:16.118376 passed all 1 test case(s) 2022-04-29 06:49:16 ./run-tests.py ap_bss_add_many DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_bss_add_many 1/1 Test: Large number of BSS add operations with hostapd Starting BSS phy=phy3 ifname=wlan3 Starting BSS phy=phy3 ifname=wlan3-0 Starting BSS phy=phy3 ifname=wlan3-1 Starting BSS phy=phy3 ifname=wlan3-2 Starting BSS phy=phy3 ifname=wlan3-3 Starting BSS phy=phy3 ifname=wlan3-4 Starting BSS phy=phy3 ifname=wlan3-5 Starting BSS phy=phy3 ifname=wlan3-6 Starting BSS phy=phy3 ifname=wlan3-7 Starting BSS phy=phy3 ifname=wlan3-8 Starting BSS phy=phy3 ifname=wlan3-9 Starting BSS phy=phy3 ifname=wlan3-10 Starting BSS phy=phy3 ifname=wlan3-11 Starting BSS phy=phy3 ifname=wlan3-12 Starting BSS phy=phy3 ifname=wlan3-13 Starting BSS phy=phy3 ifname=wlan3-14 Starting BSS phy=phy3 ifname=wlan3-15 Connect STA wlan0 to AP Connect STA wlan0 to AP Removing BSS wlan3-0 Connect STA wlan0 to AP Removing BSS wlan3-1 Connect STA wlan0 to AP Removing BSS wlan3-2 Connect STA wlan0 to AP Removing BSS wlan3-3 Connect STA wlan0 to AP Removing BSS wlan3-4 Connect STA wlan0 to AP Removing BSS wlan3-5 Connect STA wlan0 to AP Removing BSS wlan3-6 Connect STA wlan0 to AP Removing BSS wlan3-7 Connect STA wlan0 to AP Removing BSS wlan3-8 Connect STA wlan0 to AP Removing BSS wlan3-9 Connect STA wlan0 to AP Removing BSS wlan3-10 Connect STA wlan0 to AP Removing BSS wlan3-11 Connect STA wlan0 to AP Removing BSS wlan3-12 Connect STA wlan0 to AP Removing BSS wlan3-13 Connect STA wlan0 to AP Removing BSS wlan3-14 Connect STA wlan0 to AP Removing BSS wlan3-15 PASS ap_bss_add_many 6.151064 2022-04-29 06:49:22.428557 passed all 1 test case(s) 2022-04-29 06:49:22 ./run-tests.py ap_config_set_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_config_set_errors 1/1 Test: hostapd configuration parsing errors Starting AP wlan3 hs20_conn_capab limit at 16380 PASS ap_config_set_errors 1.86866 2022-04-29 06:49:24.459487 passed all 1 test case(s) 2022-04-29 06:49:24 ./run-tests.py ap_csa_1_switch_count_0 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_csa_1_switch_count_0 1/1 Test: AP Channel Switch, one switch with count 0 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_csa_1_switch_count_0 0.340433 2022-04-29 06:49:24.961777 passed all 1 test case(s) 2022-04-29 06:49:24 ./run-tests.py ap_csa_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_csa_invalid 1/1 Test: AP Channel Switch - invalid channel Starting AP wlan3 Connect STA wlan0 to AP PASS ap_csa_invalid 0.247008 2022-04-29 06:49:25.370276 passed all 1 test case(s) 2022-04-29 06:49:25 ./run-tests.py ap_ft_ap_oom7b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_ap_oom7b 1/1 Test: WPA2-PSK-FT and AP OOM 7b Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_ft_ap_oom7b 3.132552 2022-04-29 06:49:28.664602 passed all 1 test case(s) 2022-04-29 06:49:28 ./run-tests.py ap_ft_many_vlan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_many_vlan 1/1 Test: WPA2-PSK-FT AP with VLAN multiple times Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP Roam to the second AP Roaming association rejected Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 458, in test_ap_ft_many_vlan conndev="brvlan1") File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 241, in run_roams dev.roam(ap2['bssid'], fail_test=fail_test) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1235, in roam raise Exception("Roaming association rejected") Exception: Roaming association rejected FAIL ap_ft_many_vlan 3.765647 2022-04-29 06:49:32.594581 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_ft_many_vlan 2022-04-29 06:49:32 ./run-tests.py ap_ft_pmf_bip_gmac_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_pmf_bip_gmac_256 1/1 Test: WPA2-PSK-FT AP with PMF/BIP-GMAC-256 Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_pmf_bip_gmac_256 1.20688 2022-04-29 06:49:33.968008 passed all 1 test case(s) 2022-04-29 06:49:33 ./run-tests.py ap_hs20_anqp_invalid_gas_response DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_anqp_invalid_gas_response 1/1 Test: Hotspot 2.0 network selection and invalid GAS response Starting AP wlan3 ANQP: Unexpected Advertisement Protocol in response ANQP: Invalid element length for Info ID 1234 PASS ap_hs20_anqp_invalid_gas_response 0.793114 2022-04-29 06:49:34.925506 passed all 1 test case(s) 2022-04-29 06:49:34 ./run-tests.py ap_hs20_auto_interworking_no_match DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_auto_interworking_no_match 1/1 Test: Hotspot 2.0 connection with auto_interworking=1 and no matching network Starting AP wlan3 Connect STA wlan0 to AP start ping ping done start ping ping done start ping ping done start ping ping done start ping ping done PASS ap_hs20_auto_interworking_no_match 1.0212 2022-04-29 06:49:36.115122 passed all 1 test case(s) 2022-04-29 06:49:36 ./run-tests.py ap_hs20_connect_no_full_match DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_connect_no_full_match 1/1 Test: Hotspot 2.0 connection and no full match Starting AP wlan3 PASS ap_hs20_connect_no_full_match 0.707411 2022-04-29 06:49:36.987312 passed all 1 test case(s) 2022-04-29 06:49:37 ./run-tests.py ap_hs20_interworking_select_blocking_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_interworking_select_blocking_scan 1/1 Test: Ongoing INTERWORKING_SELECT blocking SCAN Starting AP wlan3 PASS ap_hs20_interworking_select_blocking_scan 0.426956 2022-04-29 06:49:37.576750 passed all 1 test case(s) 2022-04-29 06:49:37 ./run-tests.py ap_hs20_network_preference3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_network_preference3 1/1 Test: Hotspot 2.0 network selection with two credential (one preferred) Starting AP wlan3 Starting AP wlan4 PASS ap_hs20_network_preference3 0.803854 2022-04-29 06:49:38.552888 passed all 1 test case(s) 2022-04-29 06:49:38 ./run-tests.py ap_hs20_proxyarp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_proxyarp 1/1 Test: Hotspot 2.0 and ProxyARP Starting AP wlan3 Connect STA wlan1 to AP After connect: ['aaaa:bbbb:eeee::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT', 'aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT', 'aaaa:bbbb:dddd::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT'] After disconnect: [] PASS ap_hs20_proxyarp 3.492091 2022-04-29 06:49:42.205130 passed all 1 test case(s) 2022-04-29 06:49:42 ./run-tests.py ap_hs20_random_mac_addr DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_random_mac_addr 1/1 Test: Hotspot 2.0 connection with random MAC address Starting AP wlan3 PASS ap_hs20_random_mac_addr 0.908352 2022-04-29 06:49:43.274835 passed all 1 test case(s) 2022-04-29 06:49:43 ./run-tests.py ap_multi_bss_acs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_multi_bss_acs 1/1 Test: hostapd start with a multi-BSS configuration file using ACS Starting AP wlan3 Removing BSS wlan3 Starting interface wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_multi_bss_acs 7.302758 2022-04-29 06:49:50.742869 passed all 1 test case(s) 2022-04-29 06:49:50 ./run-tests.py ap_open_select_network DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_select_network 1/1 Test: Open mode connection and SELECT_NETWORK to change network Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_open_select_network 0.667737 2022-04-29 06:49:51.573534 passed all 1 test case(s) 2022-04-29 06:49:51 ./run-tests.py ap_open_tdls_vht160 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_tdls_vht160 1/1 Test: Open AP and two stations using TDLS with VHT 160 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS Station dump on dev[0]: Station 02:00:00:00:03:00 (on wlan0) inactive time: 70 ms rx bytes: 154936 rx packets: 217 tx bytes: 64623 tx packets: 53 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 50 rx drop misc: 29 signal: -20 dBm signal avg: -20 dBm beacon signal avg: -20 dBm tx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 rx bitrate: 648.0 MBit/s VHT-MCS 8 40MHz VHT-NSS 4 rx duration: 0 us expected throughput: 9.704Mbps authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 5 seconds Station 02:00:00:00:01:00 (on wlan0) inactive time: 113 ms rx bytes: 18306 rx packets: 16 tx bytes: 18306 tx packets: 14 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 50 rx drop misc: 0 signal: -20 dBm signal avg: -20 dBm beacon signal avg: -20 dBm tx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 rx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 rx duration: 0 us expected throughput: 9.704Mbps authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: yes DTIM period: 2 beacon interval:100 short slot time:yes connected time: 2 seconds Station dump on dev[1]: Station 02:00:00:00:03:00 (on wlan0) inactive time: 76 ms rx bytes: 154936 rx packets: 217 tx bytes: 64623 tx packets: 53 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 50 rx drop misc: 29 signal: -20 dBm signal avg: -20 dBm beacon signal avg: -20 dBm tx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 rx bitrate: 648.0 MBit/s VHT-MCS 8 40MHz VHT-NSS 4 rx duration: 0 us expected throughput: 9.704Mbps authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 5 seconds Station 02:00:00:00:01:00 (on wlan0) inactive time: 119 ms rx bytes: 18306 rx packets: 16 tx bytes: 18306 tx packets: 14 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 50 rx drop misc: 0 signal: -20 dBm signal avg: -20 dBm beacon signal avg: -20 dBm tx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 rx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 rx duration: 0 us expected throughput: 9.704Mbps authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: yes DTIM period: 2 beacon interval:100 short slot time:yes connected time: 2 seconds PASS ap_open_tdls_vht160 5.772971 2022-04-29 06:49:57.511446 passed all 1 test case(s) 2022-04-29 06:49:57 ./run-tests.py ap_pmf_sta_sa_query_local_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_sta_sa_query_local_failure 1/1 Test: WPA2-PSK AP with station using SA Query (local failure) Connect STA wlan0 to AP PASS ap_pmf_sta_sa_query_local_failure 1.895288 2022-04-29 06:49:59.572118 passed all 1 test case(s) 2022-04-29 06:49:59 ./run-tests.py ap_roam_signal_level_override DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_roam_signal_level_override 1/1 Test: Roam between two APs based on driver signal level override Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS ap_roam_signal_level_override 1.74551 2022-04-29 06:50:01.477875 passed all 1 test case(s) 2022-04-29 06:50:01 ./run-tests.py ap_tdls_discovery DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_tdls_discovery 1/1 Test: WPA2-PSK AP and two stations using TDLS discovery Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_tdls_discovery 1.484382 2022-04-29 06:50:03.124403 passed all 1 test case(s) 2022-04-29 06:50:03 ./run-tests.py ap_vht80_to_24g_ht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80_to_24g_ht 1/1 Test: VHT with 80 MHz channel width reconfigured to 2.4 GHz HT Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS ap_vht80_to_24g_ht 0.846567 2022-04-29 06:50:04.130179 passed all 1 test case(s) 2022-04-29 06:50:04 ./run-tests.py ap_vht_wifi_generation DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_wifi_generation 1/1 Test: VHT and wifi_generation Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan5 to AP Country code at the end: 00 PASS ap_vht_wifi_generation 1.229813 2022-04-29 06:50:05.519624 passed all 1 test case(s) 2022-04-29 06:50:05 ./run-tests.py ap_wds_sta_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wds_sta_open 1/1 Test: Open AP with STA using 4addr mode Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wds_sta_open 2.577484 2022-04-29 06:50:08.256024 passed all 1 test case(s) 2022-04-29 06:50:08 ./run-tests.py ap_wpa2_delayed_m1_m3_retransmission2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_delayed_m1_m3_retransmission2 1/1 Test: Delayed M1+M3 retransmission (change M1 ANonce) Skip test case: Not running under VM SKIP ap_wpa2_delayed_m1_m3_retransmission2 0.065483 2022-04-29 06:50:08.482852 passed all 0 test case(s) skipped 1 test case(s) 2022-04-29 06:50:08 ./run-tests.py ap_wpa2_eap_assoc_rsn DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_assoc_rsn 1/1 Test: WPA2-Enterprise AP and association request RSN IE differences Starting AP wlan3 Starting AP wlan4 Normal wpa_supplicant assoc req RSN IE Connect STA wlan0 to AP Extra PMKIDCount field in RSN IE Connect STA wlan0 to AP Extra Group Management Cipher Suite in RSN IE Connect STA wlan0 to AP Extra undefined extension field in RSN IE Connect STA wlan0 to AP RSN IE without RSN Capabilities Connect STA wlan0 to AP RSN IE without AKM Connect STA wlan0 to AP RSN IE without pairwise Connect STA wlan0 to AP RSN IE without group Connect STA wlan0 to AP Normal wpa_supplicant assoc req RSN IE Connect STA wlan0 to AP Group management cipher included in assoc req RSN IE Connect STA wlan0 to AP Invalid group cipher Connect STA wlan0 to AP Invalid pairwise cipher Connect STA wlan0 to AP Management frame protection not enabled Connect STA wlan0 to AP Unsupported management group cipher Connect STA wlan0 to AP PASS ap_wpa2_eap_assoc_rsn 2.421064 2022-04-29 06:50:11.064943 passed all 1 test case(s) 2022-04-29 06:50:11 ./run-tests.py ap_wpa2_eap_in_bridge DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_in_bridge 1/1 Test: WPA2-EAP and wpas interface in a bridge Starting AP wlan3 Connect STA wlan5 to AP PASS ap_wpa2_eap_in_bridge 2.612401 2022-04-29 06:50:13.841605 passed all 1 test case(s) 2022-04-29 06:50:13 ./run-tests.py ap_wpa2_eap_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_oom 1/1 Test: EAP server and OOM Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_oom 1.032943 2022-04-29 06:50:15.036606 passed all 1 test case(s) 2022-04-29 06:50:15 ./run-tests.py ap_wpa2_eap_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_psk 1/1 Test: WPA2-Enterprise connection using EAP-PSK Starting AP wlan3 Connect STA wlan0 to AP Negative test with incorrect password Connect STA wlan0 to AP PASS ap_wpa2_eap_psk 0.457297 2022-04-29 06:50:15.655978 passed all 1 test case(s) 2022-04-29 06:50:15 ./run-tests.py ap_wpa2_eap_ttls_chap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_chap 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/CHAP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_chap 0.422532 2022-04-29 06:50:16.238556 passed all 1 test case(s) 2022-04-29 06:50:16 ./run-tests.py ap_wpa2_eap_ttls_expired_cert DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_expired_cert 1/1 Test: WPA2-Enterprise using EAP-TTLS and expired certificate Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_expired_cert 0.312097 2022-04-29 06:50:16.718406 passed all 1 test case(s) 2022-04-29 06:50:16 ./run-tests.py ap_wpa2_gtk_initial_rsc_ccmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_gtk_initial_rsc_ccmp 1/1 Test: Initial group cipher RSC (CCMP) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_gtk_initial_rsc_ccmp 10.547284 2022-04-29 06:50:27.426648 passed all 1 test case(s) 2022-04-29 06:50:27 ./run-tests.py ap_wpa2_gtk_rekey_request DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_gtk_rekey_request 1/1 Test: WPA2-PSK AP and GTK rekey request from multiple stations Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_wpa2_gtk_rekey_request 1.827898 2022-04-29 06:50:29.414965 passed all 1 test case(s) 2022-04-29 06:50:29 ./run-tests.py ap_wpa2_psk_ap_control_port_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ap_control_port_disabled 1/1 Test: WPA2-PSK AP with nl80211 control port in AP mode disabled Starting AP wlan3 AP driver flags: ['SME', 'AP', 'SET_KEYS_AFTER_ASSOC_DONE', 'HT_2040_COEX', 'P2P_CONCURRENT', 'P2P_CAPABLE', 'AP_TEARDOWN_SUPPORT', 'P2P_MGMT_AND_NON_P2P', 'VALID_ERROR_CODES', 'OFFCHANNEL_TX', 'EAPOL_TX_STATUS', 'DEAUTH_TX_STATUS', 'TDLS_SUPPORT', 'TDLS_EXTERNAL_SETUP', 'AP_UAPSD', 'AP_MLME', 'SAE', 'IBSS', 'RADAR', 'QOS_MAPPING', 'AP_CSA', 'MESH', 'HT_IBSS', 'VHT_IBSS', 'FULL_AP_CLIENT_STATE', 'SUPPORT_FILS', 'BEACON_RATE_LEGACY', 'CONTROL_PORT', 'SAFE_PTK0_REKEYS', 'BEACON_PROTECTION', 'EXTENDED_KEY_ID'] AP driver flags2: ['CONTROL_PORT_RX', 'UNKNOWN'] STA driver flags: ['SME', 'AP', 'SET_KEYS_AFTER_ASSOC_DONE', 'HT_2040_COEX', 'P2P_CONCURRENT', 'P2P_CAPABLE', 'AP_TEARDOWN_SUPPORT', 'P2P_MGMT_AND_NON_P2P', 'VALID_ERROR_CODES', 'OFFCHANNEL_TX', 'EAPOL_TX_STATUS', 'DEAUTH_TX_STATUS', 'TDLS_SUPPORT', 'TDLS_EXTERNAL_SETUP', 'AP_UAPSD', 'AP_MLME', 'SAE', 'IBSS', 'RADAR', 'QOS_MAPPING', 'AP_CSA', 'MESH', 'HT_IBSS', 'VHT_IBSS', 'FULL_AP_CLIENT_STATE', 'SUPPORT_FILS', 'BEACON_RATE_LEGACY', 'CONTROL_PORT', 'SAFE_PTK0_REKEYS', 'BEACON_PROTECTION', 'EXTENDED_KEY_ID'] STA driver flags2: ['CONTROL_PORT_RX', 'CONTROL_PORT_TX_STATUS', 'UNKNOWN'] Connect STA wlan0 to AP PASS ap_wpa2_psk_ap_control_port_disabled 0.822839 2022-04-29 06:50:30.400461 passed all 1 test case(s) 2022-04-29 06:50:30 ./run-tests.py ap_wpa2_tdls_decline_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_tdls_decline_resp 1/1 Test: Decline TDLS Setup Response Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS PASS ap_wpa2_tdls_decline_resp 2.385841 2022-04-29 06:50:32.947314 passed all 1 test case(s) 2022-04-29 06:50:32 ./run-tests.py ap_wpa_gtk_rekey DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa_gtk_rekey 1/1 Test: WPA-PSK/TKIP AP and GTK rekey enforced by AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa_gtk_rekey 1.333621 2022-04-29 06:50:34.443189 passed all 1 test case(s) 2022-04-29 06:50:34 ./run-tests.py ap_wps_conf_pin DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_conf_pin 1/1 Test: WPS PIN provisioning with configured AP Starting AP wlan3 WPS provisioning step Try to connect from another station using the same PIN PASS ap_wps_conf_pin 13.582728 2022-04-29 06:50:48.187126 passed all 1 test case(s) 2022-04-29 06:50:48 ./run-tests.py ap_wps_conf_pin_gcmp_128 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_conf_pin_gcmp_128 1/1 Test: WPS PIN provisioning with configured AP using GCMP-128 Starting AP wlan3 WPS provisioning step PASS ap_wps_conf_pin_gcmp_128 0.48531 2022-04-29 06:50:48.836788 passed all 1 test case(s) 2022-04-29 06:50:48 ./run-tests.py ap_wps_incorrect_pin DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_incorrect_pin 1/1 Test: WPS PIN provisioning with incorrect PIN Starting AP wlan3 WPS provisioning attempt 1 WPS provisioning attempt 2 PASS ap_wps_incorrect_pin 4.173965 2022-04-29 06:50:53.174340 passed all 1 test case(s) 2022-04-29 06:50:53 ./run-tests.py ap_wps_random_ap_pin DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_random_ap_pin 1/1 Test: WPS registrar using random AP PIN Starting AP wlan3 WPS provisioning step WPS provisioning step with AP PIN disabled WPS provisioning step with AP PIN reset WPS provisioning step after AP PIN timeout WPS provisioning step after AP PIN timeout(2) PASS ap_wps_random_ap_pin 3.289475 2022-04-29 06:50:56.624326 passed all 1 test case(s) 2022-04-29 06:50:56 ./run-tests.py ap_wps_upnp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_upnp 1/1 Test: WPS AP and UPnP operations Starting AP wlan3 PASS ap_wps_upnp 0.352155 2022-04-29 06:50:57.144281 passed all 1 test case(s) 2022-04-29 06:50:57 ./run-tests.py autogo_force_diff_channel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_force_diff_channel 1/1 Test: P2P autonomous GO and station interface operate on different channels Starting AP wlan3 Connect STA wlan7 to AP Start autonomous GO wlan7 Start autonomous GO wlan7 Start autonomous GO wlan7 PASS autogo_force_diff_channel 2.21283 2022-04-29 06:50:59.520138 passed all 1 test case(s) 2022-04-29 06:50:59 ./run-tests.py connect_mbssid_open_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START connect_mbssid_open_1 1/1 Test: Connect to transmitting and nontransmitting BSS in open mode Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP wlan0: Waiting for scan operation to complete before continuing Run FLUSH again since scan was in progress PASS connect_mbssid_open_1 1.31659 2022-04-29 06:51:00.994945 passed all 1 test case(s) 2022-04-29 06:51:01 ./run-tests.py dbus_bss_expire DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_bss_expire 1/1 Test: D-Bus Get/Set BSSExpireAge and BSSExpireCount No dbus module available Skip test case: No dbus module available SKIP dbus_bss_expire 0.067934 2022-04-29 06:51:01.221224 passed all 0 test case(s) skipped 1 test case(s) 2022-04-29 06:51:01 ./run-tests.py dbus_connect_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_connect_eap 1/1 Test: D-Bus AddNetwork and connect to EAP network No dbus module available Skip test case: No dbus module available SKIP dbus_connect_eap 0.069066 2022-04-29 06:51:01.452357 passed all 0 test case(s) skipped 1 test case(s) 2022-04-29 06:51:01 ./run-tests.py dbus_p2p_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_p2p_invalid 1/1 Test: D-Bus invalid P2P operations No dbus module available Skip test case: No dbus module available SKIP dbus_p2p_invalid 0.068063 2022-04-29 06:51:01.681137 passed all 0 test case(s) skipped 1 test case(s) 2022-04-29 06:51:01 ./run-tests.py discovery_dev_type_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START discovery_dev_type_go 1/1 Test: P2P device discovery with Device Type filter on GO wlan1: Trying to discover peer 02:00:00:00:00:00 PASS discovery_dev_type_go 9.051185 2022-04-29 06:51:10.892276 passed all 1 test case(s) 2022-04-29 06:51:10 ./run-tests.py dpp_ap_config_p256_p521 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_ap_config_p256_p521 1/1 Test: DPP and AP configuration (P-256 + P-521) Starting AP wlan3 Update AP configuration to use key_mgmt=DPP Connect STA wlan1 to AP Check data connection PASS dpp_ap_config_p256_p521 0.443458 2022-04-29 06:51:11.497963 passed all 1 test case(s) 2022-04-29 06:51:11 ./run-tests.py dpp_ap_config_p384_p384 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_ap_config_p384_p384 1/1 Test: DPP and AP configuration (P-384 + P-384) Starting AP wlan3 Update AP configuration to use key_mgmt=DPP Connect STA wlan1 to AP Check data connection PASS dpp_ap_config_p384_p384 0.484976 2022-04-29 06:51:12.143554 passed all 1 test case(s) 2022-04-29 06:51:12 ./run-tests.py dpp_config_dpp_gen_prime256v1_prime256v1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_gen_prime256v1_prime256v1 1/1 Test: Generate DPP Config Object for DPP network (P-256 + P-256) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_gen_prime256v1_prime256v1 0.092096 2022-04-29 06:51:12.400891 passed all 1 test case(s) 2022-04-29 06:51:12 ./run-tests.py dpp_config_error_legacy_invalid_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_error_legacy_invalid_psk 1/1 Test: DPP Config Object legacy error - invalid psk_hex dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_error_legacy_invalid_psk 0.086751 2022-04-29 06:51:12.648537 passed all 1 test case(s) 2022-04-29 06:51:12 ./run-tests.py dpp_config_no_signed_connector DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_no_signed_connector 1/1 Test: DPP Config Object error - no signedConnector dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_no_signed_connector 0.081776 2022-04-29 06:51:12.891262 passed all 1 test case(s) 2022-04-29 06:51:12 ./run-tests.py dpp_config_root_not_an_object DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_root_not_an_object 1/1 Test: DPP Config Object error - root not an object dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_root_not_an_object 0.082622 2022-04-29 06:51:13.136855 passed all 1 test case(s) 2022-04-29 06:51:13 ./run-tests.py dpp_controller_rx_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_controller_rx_failure 1/1 Test: DPP Controller RX failure PASS dpp_controller_rx_failure 0.236328 2022-04-29 06:51:13.533877 passed all 1 test case(s) 2022-04-29 06:51:13 ./run-tests.py dpp_pfs_connect_cmd_ap_2_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pfs_connect_cmd_ap_2_sae 1/1 Test: DPP PFS and cfg80211 connect command (PFS not allowed by AP; SAE enabled) Starting AP wlan3 Connect STA wlan5 to AP Connect STA wlan5 to AP Connect STA wlan5 to AP PASS dpp_pfs_connect_cmd_ap_2_sae 2.013502 2022-04-29 06:51:15.705347 passed all 1 test case(s) 2022-04-29 06:51:15 ./run-tests.py dpp_pkex_identifier_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_identifier_mismatch 1/1 Test: DPP and PKEX with different identifiers PASS dpp_pkex_identifier_mismatch 1.174947 2022-04-29 06:51:17.042883 passed all 1 test case(s) 2022-04-29 06:51:17 ./run-tests.py dpp_proto_auth_conf_i_auth_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_conf_i_auth_mismatch 1/1 Test: DPP protocol testing - I-auth mismatch in Auth Conf PASS dpp_proto_auth_conf_i_auth_mismatch 0.078231 2022-04-29 06:51:17.280207 passed all 1 test case(s) 2022-04-29 06:51:17 ./run-tests.py dpp_qr_code_chan_list_broadcast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_chan_list_broadcast 1/1 Test: DPP QR Code and some 2.4 GHz channels (broadcast) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_chan_list_broadcast 1.090086 2022-04-29 06:51:18.531599 passed all 1 test case(s) 2022-04-29 06:51:18 ./run-tests.py dpp_qr_code_parsing_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_parsing_fail 1/1 Test: DPP QR Code parsing local failure PASS dpp_qr_code_parsing_fail 0.072083 2022-04-29 06:51:18.762600 passed all 1 test case(s) 2022-04-29 06:51:18 ./run-tests.py dpp_tcp_mutual_hostapd_conf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_tcp_mutual_hostapd_conf 1/1 Test: DPP over TCP (mutual, hostapd as Configurator) Starting AP wlan3 PASS dpp_tcp_mutual_hostapd_conf 1.615054 2022-04-29 06:51:20.537381 passed all 1 test case(s) 2022-04-29 06:51:20 ./run-tests.py eap_canned_success_before_method DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_canned_success_before_method 1/1 Test: EAP protocol tests for canned EAP-Success before any method Starting AP wlan3 Connect STA wlan0 to AP PASS eap_canned_success_before_method 0.285064 2022-04-29 06:51:20.985080 passed all 1 test case(s) 2022-04-29 06:51:21 ./run-tests.py eap_proto_psk_server DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_psk_server 1/1 Test: EAP-PSK protocol testing for the server Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_psk_server 0.568569 2022-04-29 06:51:21.714845 passed all 1 test case(s) 2022-04-29 06:51:21 ./run-tests.py eap_teap_eap_mschapv2_pac DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_eap_mschapv2_pac 1/1 Test: EAP-TEAP with inner EAP-MSCHAPv2 and PAC provisioning Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_eap_mschapv2_pac 1.193684 2022-04-29 06:51:23.067698 passed all 1 test case(s) 2022-04-29 06:51:23 ./run-tests.py eap_teap_eap_mschapv2_separate_result DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_eap_mschapv2_separate_result 1/1 Test: EAP-TEAP with inner EAP-MSCHAPv2 and separate message for Result TLV Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_eap_mschapv2_separate_result 0.342501 2022-04-29 06:51:23.577446 passed all 1 test case(s) 2022-04-29 06:51:23 ./run-tests.py eap_teap_peer_outer_tlvs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_peer_outer_tlvs 1/1 Test: EAP-TEAP with peer Outer TLVs Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_peer_outer_tlvs 0.903971 2022-04-29 06:51:24.647489 passed all 1 test case(s) 2022-04-29 06:51:24 ./run-tests.py fst_ap_ctrl_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_ctrl_iface 1/1 Test: FST control interface behavior Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Initial session params: {'old_peer_addr': '00:00:00:00:00:00', 'new_peer_addr': '00:00:00:00:00:00', 'new_ifname': 'NONE', 'old_ifname': 'NONE', 'llt': '50', 'state': 'INITIAL'} Session params after configuration: {'old_peer_addr': '02:00:00:00:05:00', 'new_peer_addr': '02:00:00:00:05:00', 'new_ifname': 'wlan4', 'old_ifname': 'wlan3', 'llt': '100', 'state': 'INITIAL'} Interface peers: ['02:00:00:00:05:00'] Peer MB IEs: 9e1c0c0200000000000000000000000000000000000000ff0200000006009e1c0c0400000000000000000000000000000000000000ff020000000600 Interfaces: [{'name': 'wlan4|02', 'priority': '00', 'llt': '00'}, {'name': 'wlan3|02', 'priority': '00', 'llt': '00'}] Groups: ['fstg0'] PASS fst_ap_ctrl_iface 0.882046 2022-04-29 06:51:25.690155 passed all 1 test case(s) 2022-04-29 06:51:25 ./run-tests.py fst_sta_config_llt_neg DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_config_llt_neg 1/1 Test: FST STA configuration negative LLT kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - try again after a second kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - could not kill the process PASS fst_sta_config_llt_neg 1.318463 2022-04-29 06:51:27.175333 passed all 1 test case(s) 2022-04-29 06:51:27 ./run-tests.py fst_sta_session_request_with_no_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_session_request_with_no_session 1/1 Test: FST STA session request with no session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Frame received, session created PASS fst_sta_session_request_with_no_session 0.806284 2022-04-29 06:51:28.143558 passed all 1 test case(s) 2022-04-29 06:51:28 ./run-tests.py fst_sta_tear_down_response_with_no_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_tear_down_response_with_no_session 1/1 Test: FST STA tear down response with no session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Frame was ignored (Tear down) PASS fst_sta_tear_down_response_with_no_session 5.739955 2022-04-29 06:51:34.083007 passed all 1 test case(s) 2022-04-29 06:51:34 ./run-tests.py gas_comeback_delay_long2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_comeback_delay_long2 1/1 Test: GAS long comeback delay over default STA timeout Starting AP wlan3 PASS gas_comeback_delay_long2 6.318696 2022-04-29 06:51:40.569131 passed all 1 test case(s) 2022-04-29 06:51:40 ./run-tests.py gas_failures DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_failures 1/1 Test: GAS failure cases Starting AP wlan3 Starting AP wlan4 PASS gas_failures 0.787395 2022-04-29 06:51:41.517477 passed all 1 test case(s) 2022-04-29 06:51:41 ./run-tests.py grpform_c DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_c 1/1 Test: P2P group formation using PIN and authorized connection (init -> GO) (group iface) Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS grpform_c 11.934758 2022-04-29 06:51:53.612811 passed all 1 test case(s) 2022-04-29 06:51:53 ./run-tests.py grpform_ext_listen_oper DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_ext_listen_oper 1/1 Test: P2P extended listen timing operations wlan0: Trying to discover peer 02:00:00:00:05:00 wlan5: Trying to discover peer 02:00:00:00:00:00 PASS grpform_ext_listen_oper 3.675716 2022-04-29 06:51:57.449792 passed all 1 test case(s) 2022-04-29 06:51:57 ./run-tests.py grpform_per_sta_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_per_sta_psk 1/1 Test: P2P group formation with per-STA PSKs Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed wlan2: Trying to discover peer 02:00:00:00:00:00 PASS grpform_per_sta_psk 8.721453 2022-04-29 06:52:06.330929 passed all 1 test case(s) 2022-04-29 06:52:06 ./run-tests.py hapd_ctrl_set_accept_mac_file DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_set_accept_mac_file 1/1 Test: hostapd and SET accept_mac_file ctrl_iface command Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS hapd_ctrl_set_accept_mac_file 1.893976 2022-04-29 06:52:08.388017 passed all 1 test case(s) 2022-04-29 06:52:08 ./run-tests.py hapd_ctrl_vendor_test DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_vendor_test 1/1 Test: hostapd and VENDOR test command Starting AP wlan3 PASS hapd_ctrl_vendor_test 0.344709 2022-04-29 06:52:08.895190 passed all 1 test case(s) 2022-04-29 06:52:08 ./run-tests.py he_prefer_he20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_prefer_he20 1/1 Test: Preference on HE20 over HT20 Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS he_prefer_he20 0.290642 2022-04-29 06:52:09.348425 passed all 1 test case(s) 2022-04-29 06:52:09 ./run-tests.py macsec_psk_cak_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_cak_mismatch 1/1 Test: MACsec PSK (CAK mismatch) Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_cak_mismatch 0.678408 2022-04-29 06:52:10.187196 passed all 0 test case(s) skipped 1 test case(s) 2022-04-29 06:52:10 ./run-tests.py mesh_secure_gcmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_gcmp 1/1 Test: Secure mesh with GCMP PASS mesh_secure_gcmp 1.344184 2022-04-29 06:52:11.942420 passed all 1 test case(s) 2022-04-29 06:52:11 ./run-tests.py mesh_wpa_auth_init_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_wpa_auth_init_oom 1/1 Test: Secure mesh network setup failing due to wpa_init() OOM PASS mesh_wpa_auth_init_oom 0.282028 2022-04-29 06:52:12.388275 passed all 1 test case(s) 2022-04-29 06:52:12 ./run-tests.py multi_ap_wps_split_mixed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_wps_split_mixed 1/1 Test: WPS on split fronthaul and backhaul AP with mixed-mode fronthaul Starting AP wlan4 Starting AP wlan3 PASS multi_ap_wps_split_mixed 9.097537 2022-04-29 06:52:21.648929 passed all 1 test case(s) 2022-04-29 06:52:21 ./run-tests.py owe_group_negotiation_connect_cmd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START owe_group_negotiation_connect_cmd 1/1 Test: Opportunistic Wireless Encryption and group negotiation (connect command) Starting AP wlan3 Connect STA wlan5 to AP PASS owe_group_negotiation_connect_cmd 0.698401 2022-04-29 06:52:22.518745 passed all 1 test case(s) 2022-04-29 06:52:22 ./run-tests.py p2p_autogo_pref_chan_disallowed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_autogo_pref_chan_disallowed 1/1 Test: P2P channel selection: GO preferred channels are disallowed Start autonomous GO wlan0 Start autonomous GO wlan0 Start autonomous GO wlan0 Start autonomous GO wlan0 Start autonomous GO wlan0 PASS p2p_autogo_pref_chan_disallowed 0.499235 2022-04-29 06:52:23.182092 passed all 1 test case(s) 2022-04-29 06:52:23 ./run-tests.py p2p_device_grpform2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_device_grpform2 1/1 Test: P2P group formation with driver using cfg80211 P2P Device (reverse) Start GO negotiation wlan7 -> wlan0 wlan0: Trying to discover peer 42:00:00:00:08:00 wlan7: Trying to discover peer 02:00:00:00:00:00 Group formed PASS p2p_device_grpform2 1.711381 2022-04-29 06:52:25.057469 passed all 1 test case(s) 2022-04-29 06:52:25 ./run-tests.py p2ps_connect_p2p_device_no_group_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_connect_p2p_device_no_group_iface 1/1 Test: P2PS connection using cfg80211 P2P Device (no separate group interface) PASS p2ps_connect_p2p_device_no_group_iface 1.001275 2022-04-29 06:52:26.222599 passed all 1 test case(s) 2022-04-29 06:52:26 ./run-tests.py p2ps_feature_capability_mac_udp_nonautoaccept DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_feature_capability_mac_udp_nonautoaccept 1/1 Test: P2PS PD Feature Capability CPT: advertiser MAC:UDP, seeker UDP:MAC, nonautoaccept PASS p2ps_feature_capability_mac_udp_nonautoaccept 0.870022 2022-04-29 06:52:27.253652 passed all 1 test case(s) 2022-04-29 06:52:27 ./run-tests.py p2ps_feature_capability_udp_mac_autoaccept DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_feature_capability_udp_mac_autoaccept 1/1 Test: P2PS PD Feature Capability CPT: advertiser UDP:MAC, seeker MAC:UDP, autoaccept PASS p2ps_feature_capability_udp_mac_autoaccept 0.34785 2022-04-29 06:52:27.761937 passed all 1 test case(s) 2022-04-29 06:52:27 ./run-tests.py pasn_fils_sha384_kdk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_fils_sha384_kdk 1/1 Test: Station authentication with FILS-SHA384 with KDK derivation during connection Starting AP as-erp Starting AP wlan3 Connect STA wlan0 to AP sta: TK: 81dee0d8653b872c25c4383369e27a7c KDK: 7e590d8cf791c009f0b61e652bfc503082d1a19f4f855fdd0007fc0346a9d59b ap : TK: 81dee0d8653b872c25c4383369e27a7c KDK: 7e590d8cf791c009f0b61e652bfc503082d1a19f4f855fdd0007fc0346a9d59b sta: TK: 366359ecbab638f58acc4b986588d542 KDK: 557c0e480e0ccea30befbe36b0ccb45a8911104a3ba5756fcd5286e2a42119cf ap : TK: 366359ecbab638f58acc4b986588d542 KDK: 557c0e480e0ccea30befbe36b0ccb45a8911104a3ba5756fcd5286e2a42119cf PASS pasn_fils_sha384_kdk 1.465228 2022-04-29 06:52:29.390555 passed all 1 test case(s) 2022-04-29 06:52:29 ./run-tests.py pasn_fils_sha384_pmksa_cache DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_fils_sha384_pmksa_cache 1/1 Test: PASN authentication with FILS-SHA384 with PMKSA caching Starting AP as-erp Starting AP wlan3 Connect STA wlan0 to AP sta: TK: 437ecd7b4e0d8bee05848676704f67b2 KDK: ap : TK: 437ecd7b4e0d8bee05848676704f67b2 KDK: PASS pasn_fils_sha384_pmksa_cache 1.276095 2022-04-29 06:52:30.827091 passed all 1 test case(s) 2022-04-29 06:52:30 ./run-tests.py persistent_group2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START persistent_group2 1/1 Test: P2P persistent group formation with reverse roles Form a persistent group Start GO negotiation wlan1 -> wlan0 wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 Group formed Terminate persistent group Re-invoke persistent group from client wlan1: Trying to discover peer 02:00:00:00:00:00 Terminate persistent group Re-invoke persistent group from GO wlan0: Trying to discover peer 02:00:00:00:01:00 Terminate persistent group PASS persistent_group2 2.248758 2022-04-29 06:52:33.239042 passed all 1 test case(s) 2022-04-29 06:52:33 ./run-tests.py prefer_ht20_during_roam DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START prefer_ht20_during_roam 1/1 Test: Preference on HT20 over no-HT in roaming consideration Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS prefer_ht20_during_roam 0.426478 2022-04-29 06:52:33.829287 passed all 1 test case(s) 2022-04-29 06:52:33 ./run-tests.py prefer_vht40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START prefer_vht40 1/1 Test: Preference on VHT40 over HT40 Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Country code at the end: 00 PASS prefer_vht40 1.293464 2022-04-29 06:52:35.294545 passed all 1 test case(s) 2022-04-29 06:52:35 ./run-tests.py radius_acct_ipaddr DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_acct_ipaddr 1/1 Test: RADIUS Accounting and Framed-IP-Address Starting AP wlan3 Connect STA wlan0 to AP PASS radius_acct_ipaddr 1.143257 2022-04-29 06:52:36.598117 passed all 1 test case(s) 2022-04-29 06:52:36 ./run-tests.py rrm_beacon_req_active_ap_channel_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_active_ap_channel_oom 1/1 Test: Beacon request - AP Channel Report subelement and OOM Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS rrm_beacon_req_active_ap_channel_oom 0.274268 2022-04-29 06:52:37.035948 passed all 1 test case(s) 2022-04-29 06:52:37 ./run-tests.py rrm_ftm_range_req_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_ftm_range_req_failure 1/1 Test: hostapd FTM range request failure Starting AP wlan3 (old add_ap argument type) Connect STA wlan1 to AP PASS rrm_ftm_range_req_failure 0.292104 2022-04-29 06:52:37.487785 passed all 1 test case(s) 2022-04-29 06:52:37 ./run-tests.py sae_bignum_failure_unsafe_group DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_bignum_failure_unsafe_group 1/1 Test: SAE and bignum failure unsafe group Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_bignum_failure_unsafe_group 0.23273 2022-04-29 06:52:37.884492 passed all 1 test case(s) 2022-04-29 06:52:37 ./run-tests.py sae_commit_invalid_scalar_element_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_commit_invalid_scalar_element_sta 1/1 Test: SAE commit invalid scalar/element from STA Starting AP wlan3 Connect STA wlan0 to AP PASS sae_commit_invalid_scalar_element_sta 1.158831 2022-04-29 06:52:39.207793 passed all 1 test case(s) 2022-04-29 06:52:39 ./run-tests.py sae_h2e_rsnxe_mismatch_assoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_h2e_rsnxe_mismatch_assoc 1/1 Test: SAE H2E and RSNXE mismatch in EAPOL-Key msg 2/4 (assoc) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_h2e_rsnxe_mismatch_assoc 0.381179 2022-04-29 06:52:39.751616 passed all 1 test case(s) 2022-04-29 06:52:39 ./run-tests.py sae_pk_group_19_sae_group_20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_group_19_sae_group_20 1/1 Test: SAE-PK with group 19 with SAE group 20 Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pk_group_19_sae_group_20 1.285701 2022-04-29 06:52:41.201042 passed all 1 test case(s) 2022-04-29 06:52:41 ./run-tests.py sae_pwe_group_22 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_group_22 1/1 Test: SAE PWE derivation options with group 22 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_group_22 0.555425 2022-04-29 06:52:41.917532 passed all 1 test case(s) 2022-04-29 06:52:41 ./run-tests.py scan_fail_type_only DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_fail_type_only 1/1 Test: Scan failures for TYPE=ONLY Starting AP wlan3 Connect STA wlan0 to AP PASS scan_fail_type_only 0.353502 2022-04-29 06:52:42.432791 passed all 1 test case(s) 2022-04-29 06:52:42 ./run-tests.py scan_for_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_for_auth 1/1 Test: cfg80211 workaround with scan-for-auth Starting AP wlan3 Connect STA wlan0 to AP PASS scan_for_auth 0.329661 2022-04-29 06:52:42.926007 passed all 1 test case(s) 2022-04-29 06:52:42 ./run-tests.py scan_only_one DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_only_one 1/1 Test: Test that scanning with a single active AP only returns that one Starting AP wlan3 PASS scan_only_one 4.054523 2022-04-29 06:52:47.143560 passed all 1 test case(s) 2022-04-29 06:52:47 ./run-tests.py scan_parsing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_parsing 1/1 Test: Scan result parsing SCAN_RESULTS: bssid / frequency / signal level / flags / ssid 02:ff:00:00:00:02 1234 10 [WEP] test 02:ff:00:00:00:03 0 0 02:ff:00:00:00:04 0 0 02:ff:00:00:00:05 58320 0 [DMG] dmg 02:ff:00:00:00:06 60480 0 [DMG][IBSS] dmg 02:ff:00:00:00:07 62640 0 [DMG][PBSS] dmg 02:ff:00:00:00:08 64800 0 [DMG][ESS] dmg 02:ff:00:00:00:09 2412 1 [WEP][ESS] upd 02:ff:00:00:00:00 0 0 BSS output: id=97 bssid=02:ff:00:00:00:02 freq=1234 beacon_int=102 capabilities=0x1234 qual=10 noise=10 level=10 tsf=1234605616436508552 age=0 ie=000474657374 flags=[WEP] ssid=test snr=10 est_throughput=100 update_idx=152 beacon_ie=000474657374 BSS output: id=98 bssid=02:ff:00:00:00:03 freq=0 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0000 flags= ssid= snr=0 est_throughput=0 update_idx=152 beacon_ie=0003ffff BSS output: id=99 bssid=02:ff:00:00:00:04 freq=0 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=00000101 flags= ssid= snr=0 est_throughput=0 update_idx=152 beacon_ie=0000 BSS output: id=100 bssid=02:ff:00:00:00:05 freq=58320 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG] ssid=dmg snr=0 est_throughput=0 update_idx=152 BSS output: id=101 bssid=02:ff:00:00:00:06 freq=60480 beacon_int=0 capabilities=0x0001 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG][IBSS] ssid=dmg snr=0 est_throughput=0 update_idx=152 BSS output: id=102 bssid=02:ff:00:00:00:07 freq=62640 beacon_int=0 capabilities=0x0002 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG][PBSS] ssid=dmg snr=0 est_throughput=0 update_idx=152 BSS output: id=103 bssid=02:ff:00:00:00:08 freq=64800 beacon_int=0 capabilities=0x0003 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG][ESS] ssid=dmg snr=0 est_throughput=0 update_idx=152 BSS output: id=104 bssid=02:ff:00:00:00:09 freq=2412 beacon_int=0 capabilities=0x0011 qual=0 noise=0 level=1 tsf=0000000000000000 age=0 ie=0003757064010182 flags=[WEP][ESS] ssid=upd snr=0 est_throughput=0 update_idx=152 BSS output: id=105 bssid=02:ff:00:00:00:00 freq=0 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0000 flags= ssid= snr=0 est_throughput=0 update_idx=152 Discovered BSSs: ['02:ff:00:00:00:02', '02:ff:00:00:00:03', '02:ff:00:00:00:04', '02:ff:00:00:00:05', '02:ff:00:00:00:06', '02:ff:00:00:00:07', '02:ff:00:00:00:08', '02:ff:00:00:00:09', '02:ff:00:00:00:00'] Update BSS parameters Updated BSS: id=104 bssid=02:ff:00:00:00:09 freq=2412 beacon_int=0 capabilities=0x0002 qual=0 noise=0 level=2 tsf=0000000000000000 age=0 ie=000375706401028204 flags=[IBSS] ssid=upd snr=0 est_throughput=0 update_idx=153 PASS scan_parsing 0.097191 2022-04-29 06:52:47.407603 passed all 1 test case(s) 2022-04-29 06:52:47 ./run-tests.py scan_reqs_with_non_scan_radio_work DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_reqs_with_non_scan_radio_work 1/1 Test: SCAN commands while non-scan radio_work is in progress PASS scan_reqs_with_non_scan_radio_work 4.146004 2022-04-29 06:52:51.716212 passed all 1 test case(s) 2022-04-29 06:52:51 ./run-tests.py sigma_dut_ap_dpp_self_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_dpp_self_config 1/1 Test: sigma_dut DPP AP Configurator using self-configuration Skip test case: sigma_dut not available SKIP sigma_dut_ap_dpp_self_config 0.618331 2022-04-29 06:52:52.494459 passed all 0 test case(s) skipped 1 test case(s) 2022-04-29 06:52:52 ./run-tests.py sigma_dut_dpp_qr_init_enrollee_configurator DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_init_enrollee_configurator 1/1 Test: sigma_dut DPP/QR initiator as Enrollee (to become Configurator) Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_init_enrollee_configurator 0.070097 2022-04-29 06:52:52.728371 passed all 0 test case(s) skipped 1 test case(s) 2022-04-29 06:52:52 ./run-tests.py sta_dynamic_down_up DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_dynamic_down_up 1/1 Test: Dynamically added wpa_supplicant interface down/up Starting AP wlan3 Create a dynamic wpa_supplicant interface and connect Connect STA wlan5 to AP PASS sta_dynamic_down_up 0.5374 2022-04-29 06:52:53.426588 passed all 1 test case(s) 2022-04-29 06:52:53 ./run-tests.py wnm_bss_transition_mgmt_query_mbo DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_transition_mgmt_query_mbo 1/1 Test: WNM BSS Transition Management query - TM only due to MBO on AP Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_bss_transition_mgmt_query_mbo 0.189054 2022-04-29 06:52:53.780002 passed all 1 test case(s) 2022-04-29 06:52:53 ./run-tests.py wpa2_ocv_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_5ghz 1/1 Test: OCV on 5 GHz Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS wpa2_ocv_5ghz 3.318032 2022-04-29 06:52:57.268826 passed all 1 test case(s) 2022-04-29 06:52:57 ./run-tests.py wpa2_ocv_ap_override_eapol_g1_post_enable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_ap_override_eapol_g1_post_enable 1/1 Test: OCV on 2.4 GHz and AP override EAPOL-Key group msg 1/2 (post enable) Starting AP wlan3 Connect STA wlan0 to AP PASS wpa2_ocv_ap_override_eapol_g1_post_enable 0.41574 2022-04-29 06:52:57.844167 passed all 1 test case(s) 2022-04-29 06:52:57 ./run-tests.py wpas_ap_default_frequency DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_default_frequency 1/1 Test: wpa_supplicant AP mode - default frequency Connect STA wlan1 to AP PASS wpas_ap_default_frequency 0.301419 2022-04-29 06:52:58.309488 passed all 1 test case(s) 2022-04-29 06:52:58 ./run-tests.py wpas_ap_wps_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_wps_disabled 1/1 Test: wpa_supplicant AP mode - WPS disabled Connect STA wlan1 to AP PASS wpas_ap_wps_disabled 0.427229 2022-04-29 06:52:58.899974 passed all 1 test case(s) 2022-04-29 06:52:58 ./run-tests.py wpas_ap_wps_pbc_overlap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_wps_pbc_overlap 1/1 Test: wpa_supplicant AP mode - WPS operations with PBC overlap PASS wpas_ap_wps_pbc_overlap 0.407618 2022-04-29 06:52:59.471800 passed all 1 test case(s) 2022-04-29 06:52:59 ./run-tests.py wpas_ctrl_tdls_discover DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_tdls_discover 1/1 Test: wpa_supplicant ctrl_iface tdls_discover PASS wpas_ctrl_tdls_discover 0.069843 2022-04-29 06:52:59.721703 passed all 1 test case(s) 2022-04-29 06:52:59 ./run-tests.py wps_ext_m2_ack_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_m2_ack_invalid 1/1 Test: WPS proto: M2 followed by invalid ACK Starting AP wlan3 PASS wps_ext_m2_ack_invalid 0.327044 2022-04-29 06:53:00.211249 passed all 1 test case(s) 2022-04-29 06:53:00 ./run-tests.py wps_ext_wsc_done_wrong_msg_type DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_wsc_done_wrong_msg_type 1/1 Test: WPS proto: WSC_Done with wrong Msg Type Starting AP wlan3 PASS wps_ext_wsc_done_wrong_msg_type 0.283172 2022-04-29 06:53:00.656379 passed all 1 test case(s) 2022-04-29 06:53:00 ./stop.sh