2022-04-29 08:31:44 export USER=root 2022-04-29 08:31:44 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client Building hostapd Building wpa_supplicant 2022-04-29 08:32:31 ./start.sh 2022-04-29 08:32:32 ./run-tests.py ap_acs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_acs 1/1 Test: Automatic channel selection Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_acs 7.350596 2022-04-29 08:32:40.707289 passed all 1 test case(s) 2022-04-29 08:32:40 ./run-tests.py ap_acs_40mhz_plus_or_minus DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_acs_40mhz_plus_or_minus 1/1 Test: Automatic channel selection for 40 MHz channel (plus or minus) Starting AP wlan3 Removing BSS wlan3 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_acs_40mhz_plus_or_minus 8.574269 2022-04-29 08:32:49.459687 passed all 1 test case(s) 2022-04-29 08:32:49 ./run-tests.py ap_bss_add_many DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_bss_add_many 1/1 Test: Large number of BSS add operations with hostapd Starting BSS phy=phy3 ifname=wlan3 Starting BSS phy=phy3 ifname=wlan3-0 Starting BSS phy=phy3 ifname=wlan3-1 Starting BSS phy=phy3 ifname=wlan3-2 Starting BSS phy=phy3 ifname=wlan3-3 Starting BSS phy=phy3 ifname=wlan3-4 Starting BSS phy=phy3 ifname=wlan3-5 Starting BSS phy=phy3 ifname=wlan3-6 Starting BSS phy=phy3 ifname=wlan3-7 Starting BSS phy=phy3 ifname=wlan3-8 Starting BSS phy=phy3 ifname=wlan3-9 Starting BSS phy=phy3 ifname=wlan3-10 Starting BSS phy=phy3 ifname=wlan3-11 Starting BSS phy=phy3 ifname=wlan3-12 Starting BSS phy=phy3 ifname=wlan3-13 Starting BSS phy=phy3 ifname=wlan3-14 Starting BSS phy=phy3 ifname=wlan3-15 Connect STA wlan0 to AP Connect STA wlan0 to AP Removing BSS wlan3-0 Connect STA wlan0 to AP Removing BSS wlan3-1 Connect STA wlan0 to AP Removing BSS wlan3-2 Connect STA wlan0 to AP Removing BSS wlan3-3 Connect STA wlan0 to AP Removing BSS wlan3-4 Connect STA wlan0 to AP Removing BSS wlan3-5 Connect STA wlan0 to AP Removing BSS wlan3-6 Connect STA wlan0 to AP Removing BSS wlan3-7 Connect STA wlan0 to AP Removing BSS wlan3-8 Connect STA wlan0 to AP Removing BSS wlan3-9 Connect STA wlan0 to AP Removing BSS wlan3-10 Connect STA wlan0 to AP Removing BSS wlan3-11 Connect STA wlan0 to AP Removing BSS wlan3-12 Connect STA wlan0 to AP Removing BSS wlan3-13 Connect STA wlan0 to AP Removing BSS wlan3-14 Connect STA wlan0 to AP Removing BSS wlan3-15 PASS ap_bss_add_many 10.671752 2022-04-29 08:33:00.289485 passed all 1 test case(s) 2022-04-29 08:33:00 ./run-tests.py ap_config_set_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_config_set_errors 1/1 Test: hostapd configuration parsing errors Starting AP wlan3 hs20_conn_capab limit at 16380 PASS ap_config_set_errors 1.666212 2022-04-29 08:33:02.116187 passed all 1 test case(s) 2022-04-29 08:33:02 ./run-tests.py ap_csa_1_switch_count_0 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_csa_1_switch_count_0 1/1 Test: AP Channel Switch, one switch with count 0 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_csa_1_switch_count_0 0.984582 2022-04-29 08:33:03.260070 passed all 1 test case(s) 2022-04-29 08:33:03 ./run-tests.py ap_csa_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_csa_invalid 1/1 Test: AP Channel Switch - invalid channel Starting AP wlan3 Connect STA wlan0 to AP PASS ap_csa_invalid 0.785663 2022-04-29 08:33:04.204883 passed all 1 test case(s) 2022-04-29 08:33:04 ./run-tests.py ap_ft_ap_oom7b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_ap_oom7b 1/1 Test: WPA2-PSK-FT and AP OOM 7b Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_ft_ap_oom7b 1.809731 2022-04-29 08:33:06.173812 passed all 1 test case(s) 2022-04-29 08:33:06 ./run-tests.py ap_ft_many_vlan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_many_vlan 1/1 Test: WPA2-PSK-FT AP with VLAN multiple times Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP Roaming association rejected Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 458, in test_ap_ft_many_vlan conndev="brvlan1") File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 273, in run_roams dev.roam(ap1['bssid']) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1235, in roam raise Exception("Roaming association rejected") Exception: Roaming association rejected FAIL ap_ft_many_vlan 3.310179 2022-04-29 08:33:09.645438 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_ft_many_vlan 2022-04-29 08:33:09 ./run-tests.py ap_ft_pmf_bip_gmac_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_pmf_bip_gmac_256 1/1 Test: WPA2-PSK-FT AP with PMF/BIP-GMAC-256 Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP Roaming association rejected Traceback (most recent call last): File "./run-tests.py", line 533, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 557, in test_ap_ft_pmf_bip_gmac_256 run_ap_ft_pmf_bip(dev, apdev, "BIP-GMAC-256") File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 580, in run_ap_ft_pmf_bip group_mgmt=cipher) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 273, in run_roams dev.roam(ap1['bssid']) File "/lkp/benchmarks/hwsim/tests/hwsim/wpasupplicant.py", line 1235, in roam raise Exception("Roaming association rejected") Exception: Roaming association rejected FAIL ap_ft_pmf_bip_gmac_256 2.034816 2022-04-29 08:33:11.848836 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_ft_pmf_bip_gmac_256 2022-04-29 08:33:11 ./run-tests.py ap_hs20_anqp_invalid_gas_response DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_anqp_invalid_gas_response 1/1 Test: Hotspot 2.0 network selection and invalid GAS response Starting AP wlan3 ANQP: Unexpected Advertisement Protocol in response ANQP: Invalid element length for Info ID 1234 PASS ap_hs20_anqp_invalid_gas_response 0.913509 2022-04-29 08:33:12.948501 passed all 1 test case(s) 2022-04-29 08:33:12 ./run-tests.py ap_hs20_auto_interworking_no_match DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_auto_interworking_no_match 1/1 Test: Hotspot 2.0 connection with auto_interworking=1 and no matching network Starting AP wlan3 Connect STA wlan0 to AP start ping ping done start ping ping done start ping ping done start ping ping done start ping ping done PASS ap_hs20_auto_interworking_no_match 1.031437 2022-04-29 08:33:14.145709 passed all 1 test case(s) 2022-04-29 08:33:14 ./run-tests.py ap_hs20_connect_no_full_match DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_connect_no_full_match 1/1 Test: Hotspot 2.0 connection and no full match Starting AP wlan3 PASS ap_hs20_connect_no_full_match 1.95336 2022-04-29 08:33:16.259251 passed all 1 test case(s) 2022-04-29 08:33:16 ./run-tests.py ap_hs20_interworking_select_blocking_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_interworking_select_blocking_scan 1/1 Test: Ongoing INTERWORKING_SELECT blocking SCAN Starting AP wlan3 PASS ap_hs20_interworking_select_blocking_scan 0.972032 2022-04-29 08:33:17.393107 passed all 1 test case(s) 2022-04-29 08:33:17 ./run-tests.py ap_hs20_network_preference3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_network_preference3 1/1 Test: Hotspot 2.0 network selection with two credential (one preferred) Starting AP wlan3 Starting AP wlan4 PASS ap_hs20_network_preference3 1.861154 2022-04-29 08:33:19.415309 passed all 1 test case(s) 2022-04-29 08:33:19 ./run-tests.py ap_hs20_proxyarp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_proxyarp 1/1 Test: Hotspot 2.0 and ProxyARP Starting AP wlan3 Connect STA wlan1 to AP After connect: ['aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT', 'aaaa:bbbb:eeee::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT', 'aaaa:bbbb:dddd::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT'] After disconnect: [] PASS ap_hs20_proxyarp 2.338882 2022-04-29 08:33:21.915933 passed all 1 test case(s) 2022-04-29 08:33:21 ./run-tests.py ap_hs20_random_mac_addr DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_random_mac_addr 1/1 Test: Hotspot 2.0 connection with random MAC address Starting AP wlan3 PASS ap_hs20_random_mac_addr 1.370079 2022-04-29 08:33:23.447892 passed all 1 test case(s) 2022-04-29 08:33:23 ./run-tests.py ap_multi_bss_acs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_multi_bss_acs 1/1 Test: hostapd start with a multi-BSS configuration file using ACS Starting AP wlan3 Removing BSS wlan3 Starting interface wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_multi_bss_acs 8.66236 2022-04-29 08:33:32.271067 passed all 1 test case(s) 2022-04-29 08:33:32 ./run-tests.py ap_open_select_network DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_select_network 1/1 Test: Open mode connection and SELECT_NETWORK to change network Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS ap_open_select_network 1.980091 2022-04-29 08:33:34.412915 passed all 1 test case(s) 2022-04-29 08:33:34 ./run-tests.py ap_open_tdls_vht160 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_tdls_vht160 1/1 Test: Open AP and two stations using TDLS with VHT 160 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS Station dump on dev[0]: Station 02:00:00:00:03:00 (on wlan0) inactive time: 67 ms rx bytes: 151794 rx packets: 183 tx bytes: 64623 tx packets: 53 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 33 rx drop misc: 29 signal: -20 dBm signal avg: -20 dBm beacon signal avg: -20 dBm tx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 rx bitrate: 175.5 MBit/s VHT-MCS 4 80MHz VHT-NSS 1 rx duration: 0 us expected throughput: 9.704Mbps authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 3 seconds Station 02:00:00:00:01:00 (on wlan0) inactive time: 105 ms rx bytes: 18306 rx packets: 16 tx bytes: 18306 tx packets: 14 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 33 rx drop misc: 0 signal: -20 dBm signal avg: -20 dBm beacon signal avg: -20 dBm tx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 rx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 rx duration: 0 us expected throughput: 9.704Mbps authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: yes DTIM period: 2 beacon interval:100 short slot time:yes connected time: 2 seconds Station dump on dev[1]: Station 02:00:00:00:03:00 (on wlan0) inactive time: 70 ms rx bytes: 151794 rx packets: 183 tx bytes: 64623 tx packets: 53 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 33 rx drop misc: 29 signal: -20 dBm signal avg: -20 dBm beacon signal avg: -20 dBm tx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 rx bitrate: 175.5 MBit/s VHT-MCS 4 80MHz VHT-NSS 1 rx duration: 0 us expected throughput: 9.704Mbps authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 3 seconds Station 02:00:00:00:01:00 (on wlan0) inactive time: 108 ms rx bytes: 18306 rx packets: 16 tx bytes: 18306 tx packets: 14 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 33 rx drop misc: 0 signal: -20 dBm signal avg: -20 dBm beacon signal avg: -20 dBm tx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 rx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 rx duration: 0 us expected throughput: 9.704Mbps authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: yes DTIM period: 2 beacon interval:100 short slot time:yes connected time: 2 seconds PASS ap_open_tdls_vht160 4.849329 2022-04-29 08:33:39.423616 passed all 1 test case(s) 2022-04-29 08:33:39 ./run-tests.py ap_pmf_sta_sa_query_local_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_sta_sa_query_local_failure 1/1 Test: WPA2-PSK AP with station using SA Query (local failure) Connect STA wlan0 to AP PASS ap_pmf_sta_sa_query_local_failure 1.312112 2022-04-29 08:33:40.900195 passed all 1 test case(s) 2022-04-29 08:33:40 ./run-tests.py ap_roam_signal_level_override DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_roam_signal_level_override 1/1 Test: Roam between two APs based on driver signal level override Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS ap_roam_signal_level_override 1.929306 2022-04-29 08:33:42.987933 passed all 1 test case(s) 2022-04-29 08:33:43 ./run-tests.py ap_tdls_discovery DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_tdls_discovery 1/1 Test: WPA2-PSK AP and two stations using TDLS discovery Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_tdls_discovery 1.661043 2022-04-29 08:33:44.809614 passed all 1 test case(s) 2022-04-29 08:33:44 ./run-tests.py ap_vht80_to_24g_ht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80_to_24g_ht 1/1 Test: VHT with 80 MHz channel width reconfigured to 2.4 GHz HT Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS ap_vht80_to_24g_ht 1.59985 2022-04-29 08:33:46.570860 passed all 1 test case(s) 2022-04-29 08:33:46 ./run-tests.py ap_vht_wifi_generation DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_wifi_generation 1/1 Test: VHT and wifi_generation Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan5 to AP Country code at the end: 00 PASS ap_vht_wifi_generation 2.044204 2022-04-29 08:33:48.777123 passed all 1 test case(s) 2022-04-29 08:33:48 ./run-tests.py ap_wds_sta_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wds_sta_open 1/1 Test: Open AP with STA using 4addr mode Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wds_sta_open 3.925113 2022-04-29 08:33:52.868733 passed all 1 test case(s) 2022-04-29 08:33:52 ./run-tests.py ap_wpa2_delayed_m1_m3_retransmission2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_delayed_m1_m3_retransmission2 1/1 Test: Delayed M1+M3 retransmission (change M1 ANonce) Skip test case: Not running under VM SKIP ap_wpa2_delayed_m1_m3_retransmission2 0.066885 2022-04-29 08:33:53.101641 passed all 0 test case(s) skipped 1 test case(s) 2022-04-29 08:33:53 ./run-tests.py ap_wpa2_eap_assoc_rsn DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_assoc_rsn 1/1 Test: WPA2-Enterprise AP and association request RSN IE differences Starting AP wlan3 Starting AP wlan4 Normal wpa_supplicant assoc req RSN IE Connect STA wlan0 to AP Extra PMKIDCount field in RSN IE Connect STA wlan0 to AP Extra Group Management Cipher Suite in RSN IE Connect STA wlan0 to AP Extra undefined extension field in RSN IE Connect STA wlan0 to AP RSN IE without RSN Capabilities Connect STA wlan0 to AP RSN IE without AKM Connect STA wlan0 to AP RSN IE without pairwise Connect STA wlan0 to AP RSN IE without group Connect STA wlan0 to AP Normal wpa_supplicant assoc req RSN IE Connect STA wlan0 to AP Group management cipher included in assoc req RSN IE Connect STA wlan0 to AP Invalid group cipher Connect STA wlan0 to AP Invalid pairwise cipher Connect STA wlan0 to AP Management frame protection not enabled Connect STA wlan0 to AP Unsupported management group cipher Connect STA wlan0 to AP PASS ap_wpa2_eap_assoc_rsn 5.020803 2022-04-29 08:33:58.289006 passed all 1 test case(s) 2022-04-29 08:33:58 ./run-tests.py ap_wpa2_eap_in_bridge DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_in_bridge 1/1 Test: WPA2-EAP and wpas interface in a bridge Starting AP wlan3 Connect STA wlan5 to AP PASS ap_wpa2_eap_in_bridge 1.56809 2022-04-29 08:34:00.016888 passed all 1 test case(s) 2022-04-29 08:34:00 ./run-tests.py ap_wpa2_eap_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_oom 1/1 Test: EAP server and OOM Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_oom 1.174194 2022-04-29 08:34:01.354068 passed all 1 test case(s) 2022-04-29 08:34:01 ./run-tests.py ap_wpa2_eap_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_psk 1/1 Test: WPA2-Enterprise connection using EAP-PSK Starting AP wlan3 Connect STA wlan0 to AP Negative test with incorrect password Connect STA wlan0 to AP PASS ap_wpa2_eap_psk 1.195669 2022-04-29 08:34:02.708899 passed all 1 test case(s) 2022-04-29 08:34:02 ./run-tests.py ap_wpa2_eap_ttls_chap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_chap 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/CHAP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_chap 0.900079 2022-04-29 08:34:03.773160 passed all 1 test case(s) 2022-04-29 08:34:03 ./run-tests.py ap_wpa2_eap_ttls_expired_cert DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_expired_cert 1/1 Test: WPA2-Enterprise using EAP-TTLS and expired certificate Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_expired_cert 0.815497 2022-04-29 08:34:04.747807 passed all 1 test case(s) 2022-04-29 08:34:04 ./run-tests.py ap_wpa2_gtk_initial_rsc_ccmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_gtk_initial_rsc_ccmp 1/1 Test: Initial group cipher RSC (CCMP) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_gtk_initial_rsc_ccmp 10.99761 2022-04-29 08:34:15.904567 passed all 1 test case(s) 2022-04-29 08:34:15 ./run-tests.py ap_wpa2_gtk_rekey_request DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_gtk_rekey_request 1/1 Test: WPA2-PSK AP and GTK rekey request from multiple stations Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_wpa2_gtk_rekey_request 2.805373 2022-04-29 08:34:18.868840 passed all 1 test case(s) 2022-04-29 08:34:18 ./run-tests.py ap_wpa2_psk_ap_control_port_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ap_control_port_disabled 1/1 Test: WPA2-PSK AP with nl80211 control port in AP mode disabled Starting AP wlan3 AP driver flags: ['SME', 'AP', 'SET_KEYS_AFTER_ASSOC_DONE', 'HT_2040_COEX', 'P2P_CONCURRENT', 'P2P_CAPABLE', 'AP_TEARDOWN_SUPPORT', 'P2P_MGMT_AND_NON_P2P', 'VALID_ERROR_CODES', 'OFFCHANNEL_TX', 'EAPOL_TX_STATUS', 'DEAUTH_TX_STATUS', 'TDLS_SUPPORT', 'TDLS_EXTERNAL_SETUP', 'AP_UAPSD', 'AP_MLME', 'SAE', 'IBSS', 'RADAR', 'QOS_MAPPING', 'AP_CSA', 'MESH', 'HT_IBSS', 'VHT_IBSS', 'FULL_AP_CLIENT_STATE', 'SUPPORT_FILS', 'BEACON_RATE_LEGACY', 'CONTROL_PORT', 'SAFE_PTK0_REKEYS', 'BEACON_PROTECTION', 'EXTENDED_KEY_ID'] AP driver flags2: ['CONTROL_PORT_RX', 'UNKNOWN'] STA driver flags: ['SME', 'AP', 'SET_KEYS_AFTER_ASSOC_DONE', 'HT_2040_COEX', 'P2P_CONCURRENT', 'P2P_CAPABLE', 'AP_TEARDOWN_SUPPORT', 'P2P_MGMT_AND_NON_P2P', 'VALID_ERROR_CODES', 'OFFCHANNEL_TX', 'EAPOL_TX_STATUS', 'DEAUTH_TX_STATUS', 'TDLS_SUPPORT', 'TDLS_EXTERNAL_SETUP', 'AP_UAPSD', 'AP_MLME', 'SAE', 'IBSS', 'RADAR', 'QOS_MAPPING', 'AP_CSA', 'MESH', 'HT_IBSS', 'VHT_IBSS', 'FULL_AP_CLIENT_STATE', 'SUPPORT_FILS', 'BEACON_RATE_LEGACY', 'CONTROL_PORT', 'SAFE_PTK0_REKEYS', 'BEACON_PROTECTION', 'EXTENDED_KEY_ID'] STA driver flags2: ['CONTROL_PORT_RX', 'CONTROL_PORT_TX_STATUS', 'UNKNOWN'] Connect STA wlan0 to AP PASS ap_wpa2_psk_ap_control_port_disabled 1.003633 2022-04-29 08:34:20.038160 passed all 1 test case(s) 2022-04-29 08:34:20 ./run-tests.py ap_wpa2_tdls_decline_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_tdls_decline_resp 1/1 Test: Decline TDLS Setup Response Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS PASS ap_wpa2_tdls_decline_resp 2.600076 2022-04-29 08:34:22.797787 passed all 1 test case(s) 2022-04-29 08:34:22 ./run-tests.py ap_wpa_gtk_rekey DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa_gtk_rekey 1/1 Test: WPA-PSK/TKIP AP and GTK rekey enforced by AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa_gtk_rekey 1.345836 2022-04-29 08:34:24.301674 passed all 1 test case(s) 2022-04-29 08:34:24 ./run-tests.py ap_wps_conf_pin DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_conf_pin 1/1 Test: WPS PIN provisioning with configured AP Starting AP wlan3 WPS provisioning step Try to connect from another station using the same PIN PASS ap_wps_conf_pin 14.504492 2022-04-29 08:34:38.967656 passed all 1 test case(s) 2022-04-29 08:34:38 ./run-tests.py ap_wps_conf_pin_gcmp_128 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_conf_pin_gcmp_128 1/1 Test: WPS PIN provisioning with configured AP using GCMP-128 Starting AP wlan3 WPS provisioning step PASS ap_wps_conf_pin_gcmp_128 1.71844 2022-04-29 08:34:40.846001 passed all 1 test case(s) 2022-04-29 08:34:40 ./run-tests.py ap_wps_incorrect_pin DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_incorrect_pin 1/1 Test: WPS PIN provisioning with incorrect PIN Starting AP wlan3 WPS provisioning attempt 1 WPS provisioning attempt 2 PASS ap_wps_incorrect_pin 6.228084 2022-04-29 08:34:47.234763 passed all 1 test case(s) 2022-04-29 08:34:47 ./run-tests.py ap_wps_random_ap_pin DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_random_ap_pin 1/1 Test: WPS registrar using random AP PIN Starting AP wlan3 WPS provisioning step WPS provisioning step with AP PIN disabled WPS provisioning step with AP PIN reset WPS provisioning step after AP PIN timeout WPS provisioning step after AP PIN timeout(2) PASS ap_wps_random_ap_pin 4.885459 2022-04-29 08:34:52.279657 passed all 1 test case(s) 2022-04-29 08:34:52 ./run-tests.py ap_wps_upnp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_upnp 1/1 Test: WPS AP and UPnP operations Starting AP wlan3 PASS ap_wps_upnp 0.487329 2022-04-29 08:34:52.934451 passed all 1 test case(s) 2022-04-29 08:34:52 ./run-tests.py autogo_force_diff_channel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_force_diff_channel 1/1 Test: P2P autonomous GO and station interface operate on different channels Starting AP wlan3 Connect STA wlan7 to AP Start autonomous GO wlan7 Start autonomous GO wlan7 Start autonomous GO wlan7 PASS autogo_force_diff_channel 2.459878 2022-04-29 08:34:55.552895 passed all 1 test case(s) 2022-04-29 08:34:55 ./run-tests.py connect_mbssid_open_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START connect_mbssid_open_1 1/1 Test: Connect to transmitting and nontransmitting BSS in open mode Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP wlan0: Waiting for scan operation to complete before continuing Run FLUSH again since scan was in progress PASS connect_mbssid_open_1 1.982069 2022-04-29 08:34:57.694791 passed all 1 test case(s) 2022-04-29 08:34:57 ./run-tests.py dbus_bss_expire DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_bss_expire 1/1 Test: D-Bus Get/Set BSSExpireAge and BSSExpireCount No dbus module available Skip test case: No dbus module available SKIP dbus_bss_expire 0.075163 2022-04-29 08:34:57.931249 passed all 0 test case(s) skipped 1 test case(s) 2022-04-29 08:34:57 ./run-tests.py dbus_connect_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_connect_eap 1/1 Test: D-Bus AddNetwork and connect to EAP network No dbus module available Skip test case: No dbus module available SKIP dbus_connect_eap 0.073442 2022-04-29 08:34:58.177032 passed all 0 test case(s) skipped 1 test case(s) 2022-04-29 08:34:58 ./run-tests.py dbus_p2p_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_p2p_invalid 1/1 Test: D-Bus invalid P2P operations No dbus module available Skip test case: No dbus module available SKIP dbus_p2p_invalid 0.067959 2022-04-29 08:34:58.413978 passed all 0 test case(s) skipped 1 test case(s) 2022-04-29 08:34:58 ./run-tests.py discovery_dev_type_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START discovery_dev_type_go 1/1 Test: P2P device discovery with Device Type filter on GO wlan1: Trying to discover peer 02:00:00:00:00:00 PASS discovery_dev_type_go 10.432088 2022-04-29 08:35:09.008711 passed all 1 test case(s) 2022-04-29 08:35:09 ./run-tests.py dpp_ap_config_p256_p521 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_ap_config_p256_p521 1/1 Test: DPP and AP configuration (P-256 + P-521) Starting AP wlan3 Update AP configuration to use key_mgmt=DPP Connect STA wlan1 to AP Check data connection PASS dpp_ap_config_p256_p521 1.537945 2022-04-29 08:35:10.709204 passed all 1 test case(s) 2022-04-29 08:35:10 ./run-tests.py dpp_ap_config_p384_p384 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_ap_config_p384_p384 1/1 Test: DPP and AP configuration (P-384 + P-384) Starting AP wlan3 Update AP configuration to use key_mgmt=DPP Connect STA wlan1 to AP Check data connection PASS dpp_ap_config_p384_p384 1.414984 2022-04-29 08:35:12.287162 passed all 1 test case(s) 2022-04-29 08:35:12 ./run-tests.py dpp_config_dpp_gen_prime256v1_prime256v1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_gen_prime256v1_prime256v1 1/1 Test: Generate DPP Config Object for DPP network (P-256 + P-256) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_gen_prime256v1_prime256v1 0.093637 2022-04-29 08:35:12.542845 passed all 1 test case(s) 2022-04-29 08:35:12 ./run-tests.py dpp_config_error_legacy_invalid_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_error_legacy_invalid_psk 1/1 Test: DPP Config Object legacy error - invalid psk_hex dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_error_legacy_invalid_psk 0.083135 2022-04-29 08:35:12.788748 passed all 1 test case(s) 2022-04-29 08:35:12 ./run-tests.py dpp_config_no_signed_connector DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_no_signed_connector 1/1 Test: DPP Config Object error - no signedConnector dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_no_signed_connector 0.082309 2022-04-29 08:35:13.031127 passed all 1 test case(s) 2022-04-29 08:35:13 ./run-tests.py dpp_config_root_not_an_object DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_root_not_an_object 1/1 Test: DPP Config Object error - root not an object dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_root_not_an_object 0.078946 2022-04-29 08:35:13.273526 passed all 1 test case(s) 2022-04-29 08:35:13 ./run-tests.py dpp_controller_rx_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_controller_rx_failure 1/1 Test: DPP Controller RX failure PASS dpp_controller_rx_failure 0.178465 2022-04-29 08:35:13.611584 passed all 1 test case(s) 2022-04-29 08:35:13 ./run-tests.py dpp_pfs_connect_cmd_ap_2_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pfs_connect_cmd_ap_2_sae 1/1 Test: DPP PFS and cfg80211 connect command (PFS not allowed by AP; SAE enabled) Starting AP wlan3 Connect STA wlan5 to AP Connect STA wlan5 to AP Connect STA wlan5 to AP PASS dpp_pfs_connect_cmd_ap_2_sae 2.08334 2022-04-29 08:35:15.853896 passed all 1 test case(s) 2022-04-29 08:35:15 ./run-tests.py dpp_pkex_identifier_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_identifier_mismatch 1/1 Test: DPP and PKEX with different identifiers PASS dpp_pkex_identifier_mismatch 1.179563 2022-04-29 08:35:17.191436 passed all 1 test case(s) 2022-04-29 08:35:17 ./run-tests.py dpp_proto_auth_conf_i_auth_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_conf_i_auth_mismatch 1/1 Test: DPP protocol testing - I-auth mismatch in Auth Conf PASS dpp_proto_auth_conf_i_auth_mismatch 0.077078 2022-04-29 08:35:17.426234 passed all 1 test case(s) 2022-04-29 08:35:17 ./run-tests.py dpp_qr_code_chan_list_broadcast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_chan_list_broadcast 1/1 Test: DPP QR Code and some 2.4 GHz channels (broadcast) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_chan_list_broadcast 1.089393 2022-04-29 08:35:18.685865 passed all 1 test case(s) 2022-04-29 08:35:18 ./run-tests.py dpp_qr_code_parsing_fail DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_parsing_fail 1/1 Test: DPP QR Code parsing local failure PASS dpp_qr_code_parsing_fail 0.075635 2022-04-29 08:35:18.920531 passed all 1 test case(s) 2022-04-29 08:35:18 ./run-tests.py dpp_tcp_mutual_hostapd_conf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_tcp_mutual_hostapd_conf 1/1 Test: DPP over TCP (mutual, hostapd as Configurator) Starting AP wlan3 PASS dpp_tcp_mutual_hostapd_conf 1.638569 2022-04-29 08:35:20.718702 passed all 1 test case(s) 2022-04-29 08:35:20 ./run-tests.py eap_canned_success_before_method DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_canned_success_before_method 1/1 Test: EAP protocol tests for canned EAP-Success before any method Starting AP wlan3 Connect STA wlan0 to AP PASS eap_canned_success_before_method 0.854648 2022-04-29 08:35:21.729893 passed all 1 test case(s) 2022-04-29 08:35:21 ./run-tests.py eap_proto_psk_server DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_psk_server 1/1 Test: EAP-PSK protocol testing for the server Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_psk_server 2.077847 2022-04-29 08:35:23.965430 passed all 1 test case(s) 2022-04-29 08:35:23 ./run-tests.py eap_teap_eap_mschapv2_pac DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_eap_mschapv2_pac 1/1 Test: EAP-TEAP with inner EAP-MSCHAPv2 and PAC provisioning Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_eap_mschapv2_pac 0.886379 2022-04-29 08:35:25.015622 passed all 1 test case(s) 2022-04-29 08:35:25 ./run-tests.py eap_teap_eap_mschapv2_separate_result DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_eap_mschapv2_separate_result 1/1 Test: EAP-TEAP with inner EAP-MSCHAPv2 and separate message for Result TLV Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_eap_mschapv2_separate_result 0.873695 2022-04-29 08:35:26.049916 passed all 1 test case(s) 2022-04-29 08:35:26 ./run-tests.py eap_teap_peer_outer_tlvs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_peer_outer_tlvs 1/1 Test: EAP-TEAP with peer Outer TLVs Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_peer_outer_tlvs 0.874085 2022-04-29 08:35:27.084874 passed all 1 test case(s) 2022-04-29 08:35:27 ./run-tests.py fst_ap_ctrl_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_ctrl_iface 1/1 Test: FST control interface behavior Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Initial session params: {'old_peer_addr': '00:00:00:00:00:00', 'new_peer_addr': '00:00:00:00:00:00', 'new_ifname': 'NONE', 'old_ifname': 'NONE', 'llt': '50', 'state': 'INITIAL'} Session params after configuration: {'old_peer_addr': '02:00:00:00:05:00', 'new_peer_addr': '02:00:00:00:05:00', 'new_ifname': 'wlan4', 'old_ifname': 'wlan3', 'llt': '100', 'state': 'INITIAL'} Interface peers: ['02:00:00:00:05:00'] Peer MB IEs: 9e1c0c0200000000000000000000000000000000000000ff0200000006009e1c0c0400000000000000000000000000000000000000ff020000000600 Interfaces: [{'name': 'wlan4|02', 'priority': '00', 'llt': '00'}, {'name': 'wlan3|02', 'priority': '00', 'llt': '00'}] Groups: ['fstg0'] PASS fst_ap_ctrl_iface 2.162368 2022-04-29 08:35:29.408974 passed all 1 test case(s) 2022-04-29 08:35:29 ./run-tests.py fst_sta_config_llt_neg DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_config_llt_neg 1/1 Test: FST STA configuration negative LLT kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - try again after a second kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - could not kill the process PASS fst_sta_config_llt_neg 1.245117 2022-04-29 08:35:30.816526 passed all 1 test case(s) 2022-04-29 08:35:30 ./run-tests.py fst_sta_session_request_with_no_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_session_request_with_no_session 1/1 Test: FST STA session request with no session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Frame received, session created PASS fst_sta_session_request_with_no_session 2.337597 2022-04-29 08:35:33.312800 passed all 1 test case(s) 2022-04-29 08:35:33 ./run-tests.py fst_sta_tear_down_response_with_no_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_tear_down_response_with_no_session 1/1 Test: FST STA tear down response with no session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Frame was ignored (Tear down) PASS fst_sta_tear_down_response_with_no_session 6.380808 2022-04-29 08:35:39.855945 passed all 1 test case(s) 2022-04-29 08:35:39 ./run-tests.py gas_comeback_delay_long2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_comeback_delay_long2 1/1 Test: GAS long comeback delay over default STA timeout Starting AP wlan3 PASS gas_comeback_delay_long2 6.574548 2022-04-29 08:35:46.593472 passed all 1 test case(s) 2022-04-29 08:35:46 ./run-tests.py gas_failures DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_failures 1/1 Test: GAS failure cases Starting AP wlan3 Starting AP wlan4 PASS gas_failures 1.250092 2022-04-29 08:35:48.007264 passed all 1 test case(s) 2022-04-29 08:35:48 ./run-tests.py grpform_c DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_c 1/1 Test: P2P group formation using PIN and authorized connection (init -> GO) (group iface) Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS grpform_c 12.370234 2022-04-29 08:36:00.536543 passed all 1 test case(s) 2022-04-29 08:36:00 ./run-tests.py grpform_ext_listen_oper DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_ext_listen_oper 1/1 Test: P2P extended listen timing operations wlan0: Trying to discover peer 02:00:00:00:05:00 wlan5: Trying to discover peer 02:00:00:00:00:00 PASS grpform_ext_listen_oper 4.397495 2022-04-29 08:36:05.092256 passed all 1 test case(s) 2022-04-29 08:36:05 ./run-tests.py grpform_per_sta_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_per_sta_psk 1/1 Test: P2P group formation with per-STA PSKs Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed wlan2: Trying to discover peer 02:00:00:00:00:00 PASS grpform_per_sta_psk 10.877636 2022-04-29 08:36:16.133462 passed all 1 test case(s) 2022-04-29 08:36:16 ./run-tests.py hapd_ctrl_set_accept_mac_file DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_set_accept_mac_file 1/1 Test: hostapd and SET accept_mac_file ctrl_iface command Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS hapd_ctrl_set_accept_mac_file 1.868483 2022-04-29 08:36:18.221976 passed all 1 test case(s) 2022-04-29 08:36:18 ./run-tests.py hapd_ctrl_vendor_test DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_vendor_test 1/1 Test: hostapd and VENDOR test command Starting AP wlan3 PASS hapd_ctrl_vendor_test 0.335101 2022-04-29 08:36:18.720525 passed all 1 test case(s) 2022-04-29 08:36:18 ./run-tests.py he_prefer_he20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_prefer_he20 1/1 Test: Preference on HE20 over HT20 Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS he_prefer_he20 1.186793 2022-04-29 08:36:20.068216 passed all 1 test case(s) 2022-04-29 08:36:20 ./run-tests.py macsec_psk_cak_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_cak_mismatch 1/1 Test: MACsec PSK (CAK mismatch) Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_cak_mismatch 0.183465 2022-04-29 08:36:20.411850 passed all 0 test case(s) skipped 1 test case(s) 2022-04-29 08:36:20 ./run-tests.py mesh_secure_gcmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_gcmp 1/1 Test: Secure mesh with GCMP PASS mesh_secure_gcmp 0.945551 2022-04-29 08:36:21.548345 passed all 1 test case(s) 2022-04-29 08:36:21 ./run-tests.py mesh_wpa_auth_init_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_wpa_auth_init_oom 1/1 Test: Secure mesh network setup failing due to wpa_init() OOM PASS mesh_wpa_auth_init_oom 0.286849 2022-04-29 08:36:21.993884 passed all 1 test case(s) 2022-04-29 08:36:22 ./run-tests.py multi_ap_wps_split_mixed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_wps_split_mixed 1/1 Test: WPS on split fronthaul and backhaul AP with mixed-mode fronthaul Starting AP wlan4 Starting AP wlan3 PASS multi_ap_wps_split_mixed 9.637533 2022-04-29 08:36:31.794052 passed all 1 test case(s) 2022-04-29 08:36:31 ./run-tests.py owe_group_negotiation_connect_cmd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START owe_group_negotiation_connect_cmd 1/1 Test: Opportunistic Wireless Encryption and group negotiation (connect command) Starting AP wlan3 Connect STA wlan5 to AP PASS owe_group_negotiation_connect_cmd 1.409302 2022-04-29 08:36:33.364922 passed all 1 test case(s) 2022-04-29 08:36:33 ./run-tests.py p2p_autogo_pref_chan_disallowed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_autogo_pref_chan_disallowed 1/1 Test: P2P channel selection: GO preferred channels are disallowed Start autonomous GO wlan0 Start autonomous GO wlan0 Start autonomous GO wlan0 Start autonomous GO wlan0 Start autonomous GO wlan0 PASS p2p_autogo_pref_chan_disallowed 2.237107 2022-04-29 08:36:35.762894 passed all 1 test case(s) 2022-04-29 08:36:35 ./run-tests.py p2p_device_grpform2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_device_grpform2 1/1 Test: P2P group formation with driver using cfg80211 P2P Device (reverse) Start GO negotiation wlan7 -> wlan0 wlan0: Trying to discover peer 42:00:00:00:08:00 wlan7: Trying to discover peer 02:00:00:00:00:00 Group formed PASS p2p_device_grpform2 2.714005 2022-04-29 08:36:38.649484 passed all 1 test case(s) 2022-04-29 08:36:38 ./run-tests.py p2ps_connect_p2p_device_no_group_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_connect_p2p_device_no_group_iface 1/1 Test: P2PS connection using cfg80211 P2P Device (no separate group interface) PASS p2ps_connect_p2p_device_no_group_iface 2.444174 2022-04-29 08:36:41.255144 passed all 1 test case(s) 2022-04-29 08:36:41 ./run-tests.py p2ps_feature_capability_mac_udp_nonautoaccept DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_feature_capability_mac_udp_nonautoaccept 1/1 Test: P2PS PD Feature Capability CPT: advertiser MAC:UDP, seeker UDP:MAC, nonautoaccept PASS p2ps_feature_capability_mac_udp_nonautoaccept 0.890343 2022-04-29 08:36:42.306454 passed all 1 test case(s) 2022-04-29 08:36:42 ./run-tests.py p2ps_feature_capability_udp_mac_autoaccept DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_feature_capability_udp_mac_autoaccept 1/1 Test: P2PS PD Feature Capability CPT: advertiser UDP:MAC, seeker MAC:UDP, autoaccept PASS p2ps_feature_capability_udp_mac_autoaccept 0.649837 2022-04-29 08:36:43.115631 passed all 1 test case(s) 2022-04-29 08:36:43 ./run-tests.py pasn_fils_sha384_kdk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_fils_sha384_kdk 1/1 Test: Station authentication with FILS-SHA384 with KDK derivation during connection Starting AP as-erp Starting AP wlan3 Connect STA wlan0 to AP sta: TK: 244c5e37cd59e9a1354974e059946d24 KDK: 0fd1686d104f6357102830550119b12c145ce537ced4375b4908e32e57ea177a ap : TK: 244c5e37cd59e9a1354974e059946d24 KDK: 0fd1686d104f6357102830550119b12c145ce537ced4375b4908e32e57ea177a sta: TK: 95036cf1060a45c9def517fabfbdf371 KDK: f8781a7055df5cee0cc9474ec9e465ce9939dd3d8717ad56210b274483e696ee ap : TK: 95036cf1060a45c9def517fabfbdf371 KDK: f8781a7055df5cee0cc9474ec9e465ce9939dd3d8717ad56210b274483e696ee PASS pasn_fils_sha384_kdk 1.723097 2022-04-29 08:36:45.002655 passed all 1 test case(s) 2022-04-29 08:36:45 ./run-tests.py pasn_fils_sha384_pmksa_cache DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_fils_sha384_pmksa_cache 1/1 Test: PASN authentication with FILS-SHA384 with PMKSA caching Starting AP as-erp Starting AP wlan3 Connect STA wlan0 to AP sta: TK: f86f8d5d6f8fee2b09f6ec655bc91c9b KDK: ap : TK: f86f8d5d6f8fee2b09f6ec655bc91c9b KDK: PASS pasn_fils_sha384_pmksa_cache 1.140195 2022-04-29 08:36:46.304120 passed all 1 test case(s) 2022-04-29 08:36:46 ./run-tests.py persistent_group2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START persistent_group2 1/1 Test: P2P persistent group formation with reverse roles Form a persistent group Start GO negotiation wlan1 -> wlan0 wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 Group formed Terminate persistent group Re-invoke persistent group from client wlan1: Trying to discover peer 02:00:00:00:00:00 Terminate persistent group Re-invoke persistent group from GO wlan0: Trying to discover peer 02:00:00:00:01:00 Terminate persistent group PASS persistent_group2 4.81447 2022-04-29 08:36:51.279120 passed all 1 test case(s) 2022-04-29 08:36:51 ./run-tests.py prefer_ht20_during_roam DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START prefer_ht20_during_roam 1/1 Test: Preference on HT20 over no-HT in roaming consideration Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS prefer_ht20_during_roam 1.666775 2022-04-29 08:36:53.104549 passed all 1 test case(s) 2022-04-29 08:36:53 ./run-tests.py prefer_vht40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START prefer_vht40 1/1 Test: Preference on VHT40 over HT40 Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Country code at the end: 00 PASS prefer_vht40 1.89894 2022-04-29 08:36:55.162225 passed all 1 test case(s) 2022-04-29 08:36:55 ./run-tests.py radius_acct_ipaddr DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_acct_ipaddr 1/1 Test: RADIUS Accounting and Framed-IP-Address Starting AP wlan3 Connect STA wlan0 to AP PASS radius_acct_ipaddr 1.047556 2022-04-29 08:36:56.370740 passed all 1 test case(s) 2022-04-29 08:36:56 ./run-tests.py rrm_beacon_req_active_ap_channel_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_active_ap_channel_oom 1/1 Test: Beacon request - AP Channel Report subelement and OOM Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP PASS rrm_beacon_req_active_ap_channel_oom 1.230065 2022-04-29 08:36:57.760105 passed all 1 test case(s) 2022-04-29 08:36:57 ./run-tests.py rrm_ftm_range_req_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_ftm_range_req_failure 1/1 Test: hostapd FTM range request failure Starting AP wlan3 (old add_ap argument type) Connect STA wlan1 to AP PASS rrm_ftm_range_req_failure 0.860726 2022-04-29 08:36:58.782555 passed all 1 test case(s) 2022-04-29 08:36:58 ./run-tests.py sae_bignum_failure_unsafe_group DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_bignum_failure_unsafe_group 1/1 Test: SAE and bignum failure unsafe group Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_bignum_failure_unsafe_group 0.364456 2022-04-29 08:36:59.309077 passed all 1 test case(s) 2022-04-29 08:36:59 ./run-tests.py sae_commit_invalid_scalar_element_sta DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_commit_invalid_scalar_element_sta 1/1 Test: SAE commit invalid scalar/element from STA Starting AP wlan3 Connect STA wlan0 to AP PASS sae_commit_invalid_scalar_element_sta 1.451788 2022-04-29 08:37:00.921017 passed all 1 test case(s) 2022-04-29 08:37:00 ./run-tests.py sae_h2e_rsnxe_mismatch_assoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_h2e_rsnxe_mismatch_assoc 1/1 Test: SAE H2E and RSNXE mismatch in EAPOL-Key msg 2/4 (assoc) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_h2e_rsnxe_mismatch_assoc 1.398846 2022-04-29 08:37:02.481924 passed all 1 test case(s) 2022-04-29 08:37:02 ./run-tests.py sae_pk_group_19_sae_group_20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_group_19_sae_group_20 1/1 Test: SAE-PK with group 19 with SAE group 20 Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pk_group_19_sae_group_20 0.924152 2022-04-29 08:37:03.590416 passed all 1 test case(s) 2022-04-29 08:37:03 ./run-tests.py sae_pwe_group_22 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_group_22 1/1 Test: SAE PWE derivation options with group 22 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_group_22 1.567698 2022-04-29 08:37:05.318519 passed all 1 test case(s) 2022-04-29 08:37:05 ./run-tests.py scan_fail_type_only DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_fail_type_only 1/1 Test: Scan failures for TYPE=ONLY Starting AP wlan3 Connect STA wlan0 to AP PASS scan_fail_type_only 0.809379 2022-04-29 08:37:06.289080 passed all 1 test case(s) 2022-04-29 08:37:06 ./run-tests.py scan_for_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_for_auth 1/1 Test: cfg80211 workaround with scan-for-auth Starting AP wlan3 Connect STA wlan0 to AP PASS scan_for_auth 0.93187 2022-04-29 08:37:07.381398 passed all 1 test case(s) 2022-04-29 08:37:07 ./run-tests.py scan_only_one DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_only_one 1/1 Test: Test that scanning with a single active AP only returns that one Starting AP wlan3 PASS scan_only_one 3.918033 2022-04-29 08:37:11.459097 passed all 1 test case(s) 2022-04-29 08:37:11 ./run-tests.py scan_parsing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_parsing 1/1 Test: Scan result parsing SCAN_RESULTS: bssid / frequency / signal level / flags / ssid 02:ff:00:00:00:02 1234 10 [WEP] test 02:ff:00:00:00:03 0 0 02:ff:00:00:00:04 0 0 02:ff:00:00:00:05 58320 0 [DMG] dmg 02:ff:00:00:00:06 60480 0 [DMG][IBSS] dmg 02:ff:00:00:00:07 62640 0 [DMG][PBSS] dmg 02:ff:00:00:00:08 64800 0 [DMG][ESS] dmg 02:ff:00:00:00:09 2412 1 [WEP][ESS] upd 02:ff:00:00:00:00 0 0 BSS output: id=98 bssid=02:ff:00:00:00:02 freq=1234 beacon_int=102 capabilities=0x1234 qual=10 noise=10 level=10 tsf=1234605616436508552 age=1 ie=000474657374 flags=[WEP] ssid=test snr=10 est_throughput=100 update_idx=155 beacon_ie=000474657374 BSS output: id=99 bssid=02:ff:00:00:00:03 freq=0 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0000 flags= ssid= snr=0 est_throughput=0 update_idx=155 beacon_ie=0003ffff BSS output: id=100 bssid=02:ff:00:00:00:04 freq=0 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=00000101 flags= ssid= snr=0 est_throughput=0 update_idx=155 beacon_ie=0000 BSS output: id=101 bssid=02:ff:00:00:00:05 freq=58320 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG] ssid=dmg snr=0 est_throughput=0 update_idx=155 BSS output: id=102 bssid=02:ff:00:00:00:06 freq=60480 beacon_int=0 capabilities=0x0001 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG][IBSS] ssid=dmg snr=0 est_throughput=0 update_idx=155 BSS output: id=103 bssid=02:ff:00:00:00:07 freq=62640 beacon_int=0 capabilities=0x0002 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG][PBSS] ssid=dmg snr=0 est_throughput=0 update_idx=155 BSS output: id=104 bssid=02:ff:00:00:00:08 freq=64800 beacon_int=0 capabilities=0x0003 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0003646d67 flags=[DMG][ESS] ssid=dmg snr=0 est_throughput=0 update_idx=155 BSS output: id=105 bssid=02:ff:00:00:00:09 freq=2412 beacon_int=0 capabilities=0x0011 qual=0 noise=0 level=1 tsf=0000000000000000 age=0 ie=0003757064010182 flags=[WEP][ESS] ssid=upd snr=0 est_throughput=0 update_idx=155 BSS output: id=106 bssid=02:ff:00:00:00:00 freq=0 beacon_int=0 capabilities=0x0000 qual=0 noise=0 level=0 tsf=0000000000000000 age=0 ie=0000 flags= ssid= snr=0 est_throughput=0 update_idx=155 Discovered BSSs: ['02:ff:00:00:00:02', '02:ff:00:00:00:03', '02:ff:00:00:00:04', '02:ff:00:00:00:05', '02:ff:00:00:00:06', '02:ff:00:00:00:07', '02:ff:00:00:00:08', '02:ff:00:00:00:09', '02:ff:00:00:00:00'] Update BSS parameters Updated BSS: id=105 bssid=02:ff:00:00:00:09 freq=2412 beacon_int=0 capabilities=0x0002 qual=0 noise=0 level=2 tsf=0000000000000000 age=0 ie=000375706401028204 flags=[IBSS] ssid=upd snr=0 est_throughput=0 update_idx=156 PASS scan_parsing 0.10045 2022-04-29 08:37:11.720466 passed all 1 test case(s) 2022-04-29 08:37:11 ./run-tests.py scan_reqs_with_non_scan_radio_work DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_reqs_with_non_scan_radio_work 1/1 Test: SCAN commands while non-scan radio_work is in progress PASS scan_reqs_with_non_scan_radio_work 4.01994 2022-04-29 08:37:15.904486 passed all 1 test case(s) 2022-04-29 08:37:15 ./run-tests.py sigma_dut_ap_dpp_self_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_dpp_self_config 1/1 Test: sigma_dut DPP AP Configurator using self-configuration Skip test case: sigma_dut not available SKIP sigma_dut_ap_dpp_self_config 0.15607 2022-04-29 08:37:16.221035 passed all 0 test case(s) skipped 1 test case(s) 2022-04-29 08:37:16 ./run-tests.py sigma_dut_dpp_qr_init_enrollee_configurator DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_init_enrollee_configurator 1/1 Test: sigma_dut DPP/QR initiator as Enrollee (to become Configurator) Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_init_enrollee_configurator 0.075357 2022-04-29 08:37:16.457219 passed all 0 test case(s) skipped 1 test case(s) 2022-04-29 08:37:16 ./run-tests.py sta_dynamic_down_up DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_dynamic_down_up 1/1 Test: Dynamically added wpa_supplicant interface down/up Starting AP wlan3 Create a dynamic wpa_supplicant interface and connect Connect STA wlan5 to AP PASS sta_dynamic_down_up 1.653385 2022-04-29 08:37:18.271924 passed all 1 test case(s) 2022-04-29 08:37:18 ./run-tests.py wnm_bss_transition_mgmt_query_mbo DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_transition_mgmt_query_mbo 1/1 Test: WNM BSS Transition Management query - TM only due to MBO on AP Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_bss_transition_mgmt_query_mbo 0.819733 2022-04-29 08:37:19.252637 passed all 1 test case(s) 2022-04-29 08:37:19 ./run-tests.py wpa2_ocv_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_5ghz 1/1 Test: OCV on 5 GHz Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP PASS wpa2_ocv_5ghz 3.302034 2022-04-29 08:37:22.718017 passed all 1 test case(s) 2022-04-29 08:37:22 ./run-tests.py wpa2_ocv_ap_override_eapol_g1_post_enable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_ap_override_eapol_g1_post_enable 1/1 Test: OCV on 2.4 GHz and AP override EAPOL-Key group msg 1/2 (post enable) Starting AP wlan3 Connect STA wlan0 to AP PASS wpa2_ocv_ap_override_eapol_g1_post_enable 0.894833 2022-04-29 08:37:23.772683 passed all 1 test case(s) 2022-04-29 08:37:23 ./run-tests.py wpas_ap_default_frequency DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_default_frequency 1/1 Test: wpa_supplicant AP mode - default frequency Connect STA wlan1 to AP PASS wpas_ap_default_frequency 0.829968 2022-04-29 08:37:24.767703 passed all 1 test case(s) 2022-04-29 08:37:24 ./run-tests.py wpas_ap_wps_disabled DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_wps_disabled 1/1 Test: wpa_supplicant AP mode - WPS disabled Connect STA wlan1 to AP PASS wpas_ap_wps_disabled 0.910199 2022-04-29 08:37:25.839128 passed all 1 test case(s) 2022-04-29 08:37:25 ./run-tests.py wpas_ap_wps_pbc_overlap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_wps_pbc_overlap 1/1 Test: wpa_supplicant AP mode - WPS operations with PBC overlap PASS wpas_ap_wps_pbc_overlap 1.397085 2022-04-29 08:37:27.398607 passed all 1 test case(s) 2022-04-29 08:37:27 ./run-tests.py wpas_ctrl_tdls_discover DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_tdls_discover 1/1 Test: wpa_supplicant ctrl_iface tdls_discover PASS wpas_ctrl_tdls_discover 0.078527 2022-04-29 08:37:27.639538 passed all 1 test case(s) 2022-04-29 08:37:27 ./run-tests.py wps_ext_m2_ack_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_m2_ack_invalid 1/1 Test: WPS proto: M2 followed by invalid ACK Starting AP wlan3 PASS wps_ext_m2_ack_invalid 0.917039 2022-04-29 08:37:28.718011 passed all 1 test case(s) 2022-04-29 08:37:28 ./run-tests.py wps_ext_wsc_done_wrong_msg_type DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_wsc_done_wrong_msg_type 1/1 Test: WPS proto: WSC_Done with wrong Msg Type Starting AP wlan3 PASS wps_ext_wsc_done_wrong_msg_type 0.917192 2022-04-29 08:37:29.793820 passed all 1 test case(s) 2022-04-29 08:37:29 ./stop.sh