2022-06-15 22:01:04 export USER=root 2022-06-15 22:01:04 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client osu_client.c: In function ‘cmd_osu_select’: osu_client.c:2090:44: warning: ‘%s’ directive output may be truncated writing up to 985 bytes into a region of size 4 [-Wformat-truncation=] 2090 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 14); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~ osu_client.c:2090:4: note: ‘snprintf’ output between 1 and 986 bytes into a destination of size 4 2090 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 14); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2103:44: warning: ‘%s’ directive output may be truncated writing up to 994 bytes into a region of size 4 [-Wformat-truncation=] 2103 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 5); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~ osu_client.c:2103:4: note: ‘snprintf’ output between 1 and 995 bytes into a destination of size 4 2103 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 5); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2077:10: warning: ‘%s’ directive output may be truncated writing up to 990 bytes into a region of size 256 [-Wformat-truncation=] 2077 | "%s", buf + 9); | ^~ In file included from ../../src/utils/common.h:12, from osu_client.c:16: ../../src/utils/os.h:552:21: note: ‘snprintf’ output between 1 and 991 bytes into a destination of size 256 552 | #define os_snprintf snprintf osu_client.c:2076:4: note: in expansion of macro ‘os_snprintf’ 2076 | os_snprintf(last->osu_nai2, sizeof(last->osu_nai2), | ^~~~~~~~~~~ osu_client.c:2071:10: warning: ‘%s’ directive output may be truncated writing up to 991 bytes into a region of size 256 [-Wformat-truncation=] 2071 | "%s", buf + 8); | ^~ In file included from ../../src/utils/common.h:12, from osu_client.c:16: ../../src/utils/os.h:552:21: note: ‘snprintf’ output between 1 and 992 bytes into a destination of size 256 552 | #define os_snprintf snprintf osu_client.c:2070:4: note: in expansion of macro ‘os_snprintf’ 2070 | os_snprintf(last->osu_nai, sizeof(last->osu_nai), | ^~~~~~~~~~~ osu_client.c:2065:7: warning: ‘%s’ directive output may be truncated writing up to 989 bytes into a region of size 33 [-Wformat-truncation=] 2064 | snprintf(last->osu_ssid2, sizeof(last->osu_ssid2), | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2065 | "%s", buf + 10); | ~^~~~~~~~~~~~~~ osu_client.c:2064:4: note: ‘snprintf’ output between 1 and 990 bytes into a destination of size 33 2064 | snprintf(last->osu_ssid2, sizeof(last->osu_ssid2), | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2065 | "%s", buf + 10); | ~~~~~~~~~~~~~~~ osu_client.c:2059:7: warning: ‘%s’ directive output may be truncated writing up to 990 bytes into a region of size 33 [-Wformat-truncation=] 2058 | snprintf(last->osu_ssid, sizeof(last->osu_ssid), | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2059 | "%s", buf + 9); | ~^~~~~~~~~~~~~ osu_client.c:2058:4: note: ‘snprintf’ output between 1 and 991 bytes into a destination of size 33 2058 | snprintf(last->osu_ssid, sizeof(last->osu_ssid), | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2059 | "%s", buf + 9); | ~~~~~~~~~~~~~~ osu_client.c:2048:44: warning: ‘%s’ directive output may be truncated writing up to 995 bytes into a region of size 256 [-Wformat-truncation=] 2048 | snprintf(last->url, sizeof(last->url), "%s", buf + 4); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~ osu_client.c:2048:4: note: ‘snprintf’ output between 1 and 996 bytes into a destination of size 256 2048 | snprintf(last->url, sizeof(last->url), "%s", buf + 4); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2040:48: warning: ‘%s’ directive output may be truncated writing up to 986 bytes into a region of size 20 [-Wformat-truncation=] 2040 | snprintf(last->bssid, sizeof(last->bssid), "%s", | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~ 2041 | buf + 13); | ~~~~~~~~~ osu_client.c:2040:4: note: ‘snprintf’ output between 1 and 987 bytes into a destination of size 20 2040 | snprintf(last->bssid, sizeof(last->bssid), "%s", | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2041 | buf + 13); | ~~~~~~~~~ Building hostapd Building wpa_supplicant 2022-06-15 22:01:46 ./start.sh 2022-06-15 22:01:47 ./run-tests.py ap_ft_ap_oom3b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_ap_oom3b 1/1 Test: WPA2-PSK-FT and AP OOM 3b Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_ft_ap_oom3b 0.495038 2022-06-15 22:01:48.953242 passed all 1 test case(s) 2022-06-15 22:01:48 ./run-tests.py ap_ft_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_sae 1/1 Test: WPA2-PSK-FT-SAE AP Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_sae 0.625623 2022-06-15 22:01:49.987073 passed all 1 test case(s) 2022-06-15 22:01:50 ./run-tests.py ap_ft_sae_over_ds_ptk_rekey0 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_sae_over_ds_ptk_rekey0 1/1 Test: WPA2-PSK-FT-SAE AP over DS and PTK rekey triggered by station Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP PASS ap_ft_sae_over_ds_ptk_rekey0 1.594694 2022-06-15 22:01:51.984793 passed all 1 test case(s) 2022-06-15 22:01:52 ./run-tests.py ap_ft_vlan_over_ds_many DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_vlan_over_ds_many 1/1 Test: WPA2-PSK-FT AP over DS with VLAN multiple times Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP PASS ap_ft_vlan_over_ds_many 8.212956 2022-06-15 22:02:00.595929 passed all 1 test case(s) 2022-06-15 22:02:00 ./run-tests.py ap_hs20_eap_cert_unknown DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_eap_cert_unknown 1/1 Test: Hotspot 2.0 connection with certificate, but unknown EAP method Starting AP wlan3 PASS ap_hs20_eap_cert_unknown 0.204541 2022-06-15 22:02:01.207217 passed all 1 test case(s) 2022-06-15 22:02:01 ./run-tests.py ap_hs20_eap_ttls_chap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_eap_ttls_chap 1/1 Test: Hotspot 2.0 connection with TTLS/CHAP Starting AP wlan3 PASS ap_hs20_eap_ttls_chap 0.389986 2022-06-15 22:02:01.994228 passed all 1 test case(s) 2022-06-15 22:02:02 ./run-tests.py ap_hs20_fetch_osu_single_ssid2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_fetch_osu_single_ssid2 1/1 Test: Hotspot 2.0 OSU provider and single SSID (two OSU providers) Starting AP wlan3 OSU-PROVIDER 02:00:00:00:03:00 uri=https://example.com/osu/ methods=00000002 osu_ssid=HS 2.0 OSU open osu_ssid2=test-hs20 osu_nai2=osen@example.com friendly_name=eng:Test OSU friendly_name=fin:Testi-OSU desc=eng:Example services desc=fin:Esimerkkipalveluja OSU-PROVIDER 02:00:00:00:03:00 uri=https://another.example.com/osu/ methods=00000002 osu_ssid=HS 2.0 OSU open osu_ssid2=test-hs20 osu_nai2=osen@another.example.com PASS ap_hs20_fetch_osu_single_ssid2 3.906584 2022-06-15 22:02:06.301877 passed all 1 test case(s) 2022-06-15 22:02:06 ./run-tests.py ap_hs20_interworking_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_interworking_oom 1/1 Test: Hotspot 2.0 network selection and OOM Starting AP wlan3 PASS ap_hs20_interworking_oom 0.698529 2022-06-15 22:02:07.396105 passed all 1 test case(s) 2022-06-15 22:02:07 ./run-tests.py ap_hs20_min_bandwidth_home2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_min_bandwidth_home2 1/1 Test: Hotspot 2.0 network selection with min bandwidth - special cases Starting AP wlan3 WAN link at capacity Downlink/Uplink Load was not measured Uplink and Downlink max values PASS ap_hs20_min_bandwidth_home2 0.326432 2022-06-15 22:02:08.118075 passed all 1 test case(s) 2022-06-15 22:02:08 ./run-tests.py ap_hs20_network_preference4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_network_preference4 1/1 Test: Hotspot 2.0 network selection with username vs. SIM credential Starting AP wlan3 Starting AP wlan4 PASS ap_hs20_network_preference4 0.569186 2022-06-15 22:02:09.084513 passed all 1 test case(s) 2022-06-15 22:02:09 ./run-tests.py ap_hs20_sim_imsi_privacy DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_sim_imsi_privacy 1/1 Test: Hotspot 2.0 with simulated SIM and EAP-SIM with IMSI privacy Starting AP wlan3 PASS ap_hs20_sim_imsi_privacy 0.308483 2022-06-15 22:02:09.787264 passed all 1 test case(s) 2022-06-15 22:02:09 ./run-tests.py ap_hs20_sim_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_sim_oom 1/1 Test: Hotspot 2.0 with simulated SIM and EAP-SIM - OOM Starting AP wlan3 PASS ap_hs20_sim_oom 0.229227 2022-06-15 22:02:10.414259 passed all 1 test case(s) 2022-06-15 22:02:10 ./run-tests.py ap_open_poll_sta_no_ack DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_poll_sta_no_ack 1/1 Test: AP with open mode and STA poll without ACK Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_poll_sta_no_ack 1.205146 2022-06-15 22:02:12.014210 passed all 1 test case(s) 2022-06-15 22:02:12 ./run-tests.py ap_open_tdls_vht80 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_tdls_vht80 1/1 Test: Open AP and two stations using TDLS with VHT 80 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS Station dump on dev[0]: Station 02:00:00:00:03:00 (on wlan0) inactive time: 63 ms rx bytes: 150872 rx packets: 173 tx bytes: 64625 tx packets: 53 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 26 rx drop misc: 29 signal: -27 dBm signal avg: -27 dBm beacon signal avg: -27 dBm tx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 tx duration: 0 us rx bitrate: 81.0 MBit/s VHT-MCS 1 40MHz VHT-NSS 3 rx duration: 0 us expected throughput: 9.704Mbps authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 3 seconds associated at [boottime]: 100.727s associated at: 1655330532887 ms current time: 1655330535563 ms Station 02:00:00:00:01:00 (on wlan0) inactive time: 99 ms rx bytes: 18306 rx packets: 16 tx bytes: 18306 tx packets: 14 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 26 rx drop misc: 0 signal: -27 dBm signal avg: -27 dBm beacon signal avg: -27 dBm tx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 tx duration: 0 us rx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 rx duration: 0 us expected throughput: 9.704Mbps authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: yes DTIM period: 2 beacon interval:100 short slot time:yes connected time: 2 seconds associated at [boottime]: 101.050s associated at: 1655330533210 ms current time: 1655330535563 ms Station dump on dev[1]: Station 02:00:00:00:03:00 (on wlan0) inactive time: 73 ms rx bytes: 150872 rx packets: 173 tx bytes: 64625 tx packets: 53 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 26 rx drop misc: 29 signal: -27 dBm signal avg: -27 dBm beacon signal avg: -27 dBm tx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 tx duration: 0 us rx bitrate: 81.0 MBit/s VHT-MCS 1 40MHz VHT-NSS 3 rx duration: 0 us expected throughput: 9.704Mbps authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 3 seconds associated at [boottime]: 100.727s associated at: 1655330532887 ms current time: 1655330535573 ms Station 02:00:00:00:01:00 (on wlan0) inactive time: 109 ms rx bytes: 18306 rx packets: 16 tx bytes: 18306 tx packets: 14 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 26 rx drop misc: 0 signal: -27 dBm signal avg: -27 dBm beacon signal avg: -27 dBm tx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 tx duration: 0 us rx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 rx duration: 0 us expected throughput: 9.704Mbps authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: yes DTIM period: 2 beacon interval:100 short slot time:yes connected time: 2 seconds associated at [boottime]: 101.050s associated at: 1655330533210 ms current time: 1655330535573 ms PASS ap_open_tdls_vht80 3.472087 2022-06-15 22:02:15.881171 passed all 1 test case(s) 2022-06-15 22:02:15 ./run-tests.py ap_pmf_assoc_comeback2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_assoc_comeback2 1/1 Test: WPA2-PSK AP with PMF association comeback (using DROP_SA) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_assoc_comeback2 1.464797 2022-06-15 22:02:17.743846 passed all 1 test case(s) 2022-06-15 22:02:17 ./run-tests.py ap_pmf_required_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_required_eap 1/1 Test: WPA2-EAP AP with PMF required Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_pmf_required_eap 0.416652 2022-06-15 22:02:18.556684 passed all 1 test case(s) 2022-06-15 22:02:18 ./run-tests.py ap_tdls_chan_switch_prohibit DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_tdls_chan_switch_prohibit 1/1 Test: Open AP and TDLS channel switch prohibited Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS PASS ap_tdls_chan_switch_prohibit 1.819877 2022-06-15 22:02:20.772172 passed all 1 test case(s) 2022-06-15 22:02:20 ./run-tests.py ap_vht_csa_vht80p80 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_csa_vht80p80 1/1 Test: VHT CSA with VHT80+80 getting enabled Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP SIGNAL_POLL(1): ['RSSI=-27', 'LINKSPEED=6', 'NOISE=-92', 'FREQUENCY=5180', 'WIDTH=80+80 MHz', 'CENTER_FRQ1=5210', 'CENTER_FRQ2=5775', 'AVG_RSSI=-27', 'AVG_BEACON_RSSI=-27'] SIGNAL_POLL(0): ['RSSI=-27', 'LINKSPEED=6', 'NOISE=9999', 'FREQUENCY=5180', 'WIDTH=40 MHz', 'CENTER_FRQ1=5190', 'AVG_RSSI=-26', 'AVG_BEACON_RSSI=-26'] PASS ap_vht_csa_vht80p80 1.778367 2022-06-15 22:02:22.949439 passed all 1 test case(s) 2022-06-15 22:02:22 ./run-tests.py ap_wds_sta_wep DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wds_sta_wep 1/1 Test: WEP AP with STA using 4addr mode Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wds_sta_wep 0.640814 2022-06-15 22:02:23.985739 passed all 1 test case(s) 2022-06-15 22:02:24 ./run-tests.py ap_wmm_uapsd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wmm_uapsd 1/1 Test: AP with U-APSD advertisement Starting AP wlan3 Connect STA wlan0 to AP dev1->dev2 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_params.py", line 876, in test_ap_wmm_uapsd hwsim_utils.test_connectivity(dev[0], hapd) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev1->dev2 unicast data delivery failed FAIL ap_wmm_uapsd 5.231022 2022-06-15 22:02:29.614169 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wmm_uapsd 2022-06-15 22:02:29 ./run-tests.py ap_wpa2_eap_fast_mschapv2_unauth_prov DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_mschapv2_unauth_prov 1/1 Test: WPA2-Enterprise connection using EAP-FAST/MSCHAPv2 and unauthenticated provisioning Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_mschapv2_unauth_prov 0.52832 2022-06-15 22:02:30.537674 passed all 1 test case(s) 2022-06-15 22:02:30 ./run-tests.py ap_wpa2_eap_fast_prov DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_prov 1/1 Test: EAP-FAST and provisioning options Starting AP wlan3 Provisioning attempt while server has provisioning disabled Connect STA wlan0 to AP Authenticated provisioning Provisioning disabled - using previously provisioned PAC Drop PAC and verify connection failure Anonymous provisioning Provisioning disabled - using previously provisioned PAC PASS ap_wpa2_eap_fast_prov 0.948806 2022-06-15 22:02:31.883168 passed all 1 test case(s) 2022-06-15 22:02:31 ./run-tests.py ap_wpa2_eap_no_workaround DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_no_workaround 1/1 Test: WPA2-Enterprise connection using EAP-TTLS and eap_workaround=0 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_no_workaround 0.285679 2022-06-15 22:02:32.570178 passed all 1 test case(s) 2022-06-15 22:02:32 ./run-tests.py ap_wpa2_eap_sim DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sim 1/1 Test: WPA2-Enterprise connection using EAP-SIM Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Negative test with incorrect key Connect STA wlan0 to AP Invalid GSM-Milenage key Connect STA wlan0 to AP Invalid GSM-Milenage key(2) Connect STA wlan0 to AP Invalid GSM-Milenage key(3) Connect STA wlan0 to AP Invalid GSM-Milenage key(4) Connect STA wlan0 to AP Missing key configuration Connect STA wlan0 to AP PASS ap_wpa2_eap_sim 0.779755 2022-06-15 22:02:33.747243 passed all 1 test case(s) 2022-06-15 22:02:33 ./run-tests.py ap_wpa2_eap_sim_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sim_config 1/1 Test: EAP-SIM configuration options Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_wpa2_eap_sim_config 0.413418 2022-06-15 22:02:34.557270 passed all 1 test case(s) 2022-06-15 22:02:34 ./run-tests.py ap_wpa2_eap_tls_ocsp_invalid_data DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_ocsp_invalid_data 1/1 Test: WPA2-Enterprise connection using EAP-TLS and invalid OCSP data Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_ocsp_invalid_data 0.242515 2022-06-15 22:02:35.196798 passed all 1 test case(s) 2022-06-15 22:02:35 ./run-tests.py ap_wpa2_eap_too_many_roundtrips DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_too_many_roundtrips 1/1 Test: WPA2-Enterprise connection resulting in too many EAP roundtrips Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_too_many_roundtrips 0.337767 2022-06-15 22:02:35.933510 passed all 1 test case(s) 2022-06-15 22:02:35 ./run-tests.py ap_wpa2_eap_ttls_eap_gtc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_eap_gtc 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/EAP-GTC Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_eap_gtc 0.325934 2022-06-15 22:02:36.657910 passed all 1 test case(s) 2022-06-15 22:02:36 ./run-tests.py ap_wpa2_eap_ttls_pap_subject_match DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_pap_subject_match 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/PAP and (alt)subject_match Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_pap_subject_match 0.292987 2022-06-15 22:02:37.346107 passed all 1 test case(s) 2022-06-15 22:02:37 ./run-tests.py ap_wpa2_psk_supp_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_supp_proto 1/1 Test: WPA2-PSK 4-way handshake protocol testing for supplicant Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_supp_proto 0.228411 2022-06-15 22:02:37.968225 passed all 1 test case(s) 2022-06-15 22:02:38 ./run-tests.py ap_wpa2_ptk_rekey DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_ptk_rekey 1/1 Test: WPA2-PSK AP and PTK rekey enforced by station Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_ptk_rekey 1.312821 2022-06-15 22:02:39.677592 passed all 1 test case(s) 2022-06-15 22:02:39 ./run-tests.py ap_wps_authenticator_mismatch_m4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_authenticator_mismatch_m4 1/1 Test: WPS and Authenticator attribute mismatch in M4 Starting AP wlan3 PASS ap_wps_authenticator_mismatch_m4 0.253872 2022-06-15 22:02:40.327632 passed all 1 test case(s) 2022-06-15 22:02:40 ./run-tests.py ap_wps_auto_setup_with_config_file DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_auto_setup_with_config_file 1/1 Test: WPS auto-setup with configuration file Starting BSS phy=phy3 ifname=wlan3 PASS ap_wps_auto_setup_with_config_file 0.364216 2022-06-15 22:02:41.087171 passed all 1 test case(s) 2022-06-15 22:02:41 ./run-tests.py ap_wps_config_without_wps DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_config_without_wps 1/1 Test: AP configuration attempt using wps_config when WPS is disabled Starting AP wlan3 PASS ap_wps_config_without_wps 0.130057 2022-06-15 22:02:41.613557 passed all 1 test case(s) 2022-06-15 22:02:41 ./run-tests.py ap_wps_er_add_enrollee DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_add_enrollee 1/1 Test: WPS ER configuring AP and adding a new enrollee using PIN Starting AP wlan3 WPS configuration step Start ER Learn AP configuration through UPnP Add Enrollee using ER Add a specific Enrollee using ER Verify registrar selection behavior Stop ER PASS ap_wps_er_add_enrollee 11.669288 2022-06-15 22:02:53.678585 passed all 1 test case(s) 2022-06-15 22:02:53 ./run-tests.py ap_wps_er_http_proto_no_control_url DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto_no_control_url 1/1 Test: WPS ER HTTP protocol testing - no controlURL HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 PASS ap_wps_er_http_proto_no_control_url 2.111521 2022-06-15 22:02:56.184815 passed all 1 test case(s) 2022-06-15 22:02:56 ./run-tests.py ap_wps_er_multi_add_enrollee DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_multi_add_enrollee 1/1 Test: Multiple WPS ERs adding a new enrollee using PIN Starting AP wlan3 PASS ap_wps_er_multi_add_enrollee 2.978555 2022-06-15 22:02:59.560468 passed all 1 test case(s) 2022-06-15 22:02:59 ./run-tests.py ap_wps_m2_unknown_opcode DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_m2_unknown_opcode 1/1 Test: WPS and M2 but unknown opcode Starting AP wlan3 PASS ap_wps_m2_unknown_opcode 0.31087 2022-06-15 22:03:00.266690 passed all 1 test case(s) 2022-06-15 22:03:00 ./run-tests.py ap_wps_pk_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_pk_oom 1/1 Test: WPS and public key OOM Starting AP wlan3 PASS ap_wps_pk_oom 0.34715 2022-06-15 22:03:01.009508 passed all 1 test case(s) 2022-06-15 22:03:01 ./run-tests.py ap_wps_upnp_http_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_upnp_http_proto 1/1 Test: WPS AP and UPnP/HTTP protocol testing Starting AP wlan3 PASS ap_wps_upnp_http_proto 1.370794 2022-06-15 22:03:02.776911 passed all 1 test case(s) 2022-06-15 22:03:02 ./run-tests.py authsrv_testing_options DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START authsrv_testing_options 1/1 Test: Authentication server and testing options Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS authsrv_testing_options 0.899983 2022-06-15 22:03:04.072320 passed all 1 test case(s) 2022-06-15 22:03:04 ./run-tests.py autogo_join_before_found DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_join_before_found 1/1 Test: P2P client joining a group before having found GO Device Address Start autonomous GO wlan0 PASS autogo_join_before_found 0.395801 2022-06-15 22:03:04.862587 passed all 1 test case(s) 2022-06-15 22:03:04 ./run-tests.py dbus_autoscan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_autoscan 1/1 Test: D-Bus Autoscan() PASS dbus_autoscan 0.113468 2022-06-15 22:03:05.373771 passed all 1 test case(s) 2022-06-15 22:03:05 ./run-tests.py dbus_p2p_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_p2p_config 1/1 Test: D-Bus Get/Set P2PDeviceConfig PASS dbus_p2p_config 0.11326 2022-06-15 22:03:05.883475 passed all 1 test case(s) 2022-06-15 22:03:05 ./run-tests.py dbus_p2p_go_neg_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_p2p_go_neg_auth 1/1 Test: D-Bus P2P GO Negotiation authorized wlan1: Trying to discover peer 02:00:00:00:00:00 PASS dbus_p2p_go_neg_auth 1.035359 2022-06-15 22:03:07.313815 passed all 1 test case(s) 2022-06-15 22:03:07 ./run-tests.py discovery_dev_type DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START discovery_dev_type 1/1 Test: P2P device discovery with Device Type filter PASS discovery_dev_type 1.632998 2022-06-15 22:03:09.344141 passed all 1 test case(s) 2022-06-15 22:03:09 ./run-tests.py dpp_auth_req_stop_after_ack DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_auth_req_stop_after_ack 1/1 Test: DPP initiator stopping after ACK, but no response PASS dpp_auth_req_stop_after_ack 2.122814 2022-06-15 22:03:11.860775 passed all 1 test case(s) 2022-06-15 22:03:11 ./run-tests.py dpp_conf_file_update DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_conf_file_update 1/1 Test: DPP provisioning updating wpa_supplicant configuration file dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_conf_file_update 0.225398 2022-06-15 22:03:12.481757 passed all 1 test case(s) 2022-06-15 22:03:12 ./run-tests.py dpp_config_connector_error_net_access_key_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_connector_error_net_access_key_mismatch 1/1 Test: DPP Config Object connector error - netAccessKey mismatch r=21c0d05a8658d592558c85e492397bcf0256504f347e6781ae386de001c9f63a s=0b11c281cee1d0004f924b478bc77858eaf78abfd102b2fbddb104e98191b2c6 dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_connector_error_net_access_key_mismatch 0.12083 2022-06-15 22:03:12.998598 passed all 1 test case(s) 2022-06-15 22:03:13 ./run-tests.py dpp_config_dpp_gen_secp521r1_secp521r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_gen_secp521r1_secp521r1 1/1 Test: Generate DPP Config Object for DPP network (P-521 + P-521) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_gen_secp521r1_secp521r1 0.127949 2022-06-15 22:03:13.520711 passed all 1 test case(s) 2022-06-15 22:03:13 ./run-tests.py dpp_config_jwk_error_invalid_x DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jwk_error_invalid_x 1/1 Test: DPP Config Object JWK error - invalid x dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jwk_error_invalid_x 0.11768 2022-06-15 22:03:14.032269 passed all 1 test case(s) 2022-06-15 22:03:14 ./run-tests.py dpp_config_jwk_error_no_kid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jwk_error_no_kid 1/1 Test: DPP Config Object JWK error - no kid dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jwk_error_no_kid 0.122445 2022-06-15 22:03:14.552249 passed all 1 test case(s) 2022-06-15 22:03:14 ./run-tests.py dpp_config_jws_error_prot_hdr_unexpected_kid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jws_error_prot_hdr_unexpected_kid 1/1 Test: DPP Config Object JWS error - protected header - unexpected kid dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jws_error_prot_hdr_unexpected_kid 0.120048 2022-06-15 22:03:15.068832 passed all 1 test case(s) 2022-06-15 22:03:15 ./run-tests.py dpp_config_save2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_save2 1/1 Test: DPP configuration saving (2) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication Saved configuration: ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=adm update_config=1 dpp_config_processing=1 network={ ssid=012a psk="secret passphrase" key_mgmt=WPA-PSK FT-PSK WPA-PSK-SHA256 mesh_fwding=1 disabled=1 ieee80211w=1 } PASS dpp_config_save2 0.175101 2022-06-15 22:03:15.637813 passed all 1 test case(s) 2022-06-15 22:03:15 ./run-tests.py dpp_config_signed_connector_error_no_dot_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_signed_connector_error_no_dot_1 1/1 Test: DPP Config Object signedConnector error - no dot(1) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_signed_connector_error_no_dot_1 0.118531 2022-06-15 22:03:16.153179 passed all 1 test case(s) 2022-06-15 22:03:16 ./run-tests.py dpp_pkex_identifier_mismatch2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_identifier_mismatch2 1/1 Test: DPP and PKEX with initiator using identifier and the responder not PASS dpp_pkex_identifier_mismatch2 1.213449 2022-06-15 22:03:17.770706 passed all 1 test case(s) 2022-06-15 22:03:17 ./run-tests.py dpp_pkex_v2_hostapd_responder DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_v2_hostapd_responder 1/1 Test: DPP PKEXv2 with hostapd as responder Skip test case: DPP version 3 not supported SKIP dpp_pkex_v2_hostapd_responder 0.104715 2022-06-15 22:03:18.270617 passed all 0 test case(s) skipped 1 test case(s) 2022-06-15 22:03:18 ./run-tests.py dpp_proto_after_wrapped_data_conf_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_after_wrapped_data_conf_req 1/1 Test: DPP protocol testing - attribute after Wrapped Data in Conf Req PASS dpp_proto_after_wrapped_data_conf_req 0.116583 2022-06-15 22:03:18.784533 passed all 1 test case(s) 2022-06-15 22:03:18 ./run-tests.py dpp_proto_auth_req_no_wrapped_data DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_req_no_wrapped_data 1/1 Test: DPP protocol testing - no Wrapped Data in Auth Req PASS dpp_proto_auth_req_no_wrapped_data 0.209563 2022-06-15 22:03:19.391104 passed all 1 test case(s) 2022-06-15 22:03:19 ./run-tests.py dpp_proto_conf_resp_e_nonce_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_conf_resp_e_nonce_mismatch 1/1 Test: DPP protocol testing - E-nonce mismatch in Conf Resp PASS dpp_proto_conf_resp_e_nonce_mismatch 0.11924 2022-06-15 22:03:19.905525 passed all 1 test case(s) 2022-06-15 22:03:19 ./run-tests.py dpp_qr_code_curve_brainpoolP512r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_curve_brainpoolP512r1 1/1 Test: DPP QR Code and curve brainpoolP512r1 dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_curve_brainpoolP512r1 0.131541 2022-06-15 22:03:20.431797 passed all 1 test case(s) 2022-06-15 22:03:20 ./run-tests.py eap_proto_pax DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_pax 1/1 Test: EAP-PAX protocol tests Starting AP wlan3 Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 025200090175736572 Test: Missing payload Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 022b00090175736572 Test: Minimum length payload Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 02ea00090175736572 Test: Unsupported MAC ID Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 024f00090175736572 Test: Unsupported DH Group ID Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 023500090175736572 Test: Unsupported Public Key ID Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 028900090175736572 Test: More fragments Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 02e700090175736572 Test: Invalid ICV Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 026300090175736572 Test: Invalid ICV in short frame Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 024e00090175736572 Test: Correct ICV - unsupported op_code Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 02b200090175736572 Test: Correct ICV - CE flag in STD-1 Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 02d700090175736572 Test: Correct ICV - too short STD-1 payload Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 026400090175736572 Test: Correct ICV - incorrect A length in STD-1 Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 023200090175736572 Test: Correct ICV - extra data in STD-1 pax_handler - RX 020a00542e02000100000020d2dd7e26bb4e3ceb20c4c7505d738e17f13aa0bb16c71e0c749cbfc22034350c000475736572001068b808d85edb50503abf9be846cc2db9bcc2d839b0915d4214fb629356c006c2 Test: Unexpected STD-1 Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 023100090175736572 Test: STD-1 pax_handler - RX 020a00542e02000100000020d152d6afec7c210473c46a923d76e49180f45e8cd22a7c2997d73a09f9413973000475736572001097beb88366c959f93c13824a89b8caf0fe0e68dac103447e2b97f230e4915308 Test: MAC ID changed during session Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 02c900090175736572 Test: STD-1 pax_handler - RX 020a00542e020001000000208a1625c6a493a77ff092f7079bc0d17477a548896a78844453fb28cf1f519efa000475736572001069e3a53bfaf570b1286ca4bf85c55ec885ca3757c2e508db131e8195a9490685 Test: DH Group ID changed during session Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 026f00090175736572 Test: STD-1 pax_handler - RX 020a00542e020001000000202443ae184d2deb94db0ba5a55528d36df0ab4e170f1e9fda729be6a8660f77e600047573657200109f1432b7341fccc6134e936fe389fdd80f76c7c950225ab87bb1e33e9c53c123 Test: Public Key ID changed during session Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 02a300090175736572 Test: Unexpected STD-3 Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 023200090175736572 Test: STD-1 pax_handler - RX 020a00542e02000100000020134f0ebecab253ee9b3ac7b1569f2f2f9b824483bde42f90fb2c932486ef8a1d000475736572001091016bbe2e22bfcd71ce15edb11075ca0baf23b990a5b866f0ebe097b2b261c9 Test: STD-3 with CE flag Too short password Connect STA wlan0 to AP pax_handler - RX 021000090175736572 Test: Default request pax_handler - RX 020c00060300 Test: Default EAP-Failure No password Connect STA wlan0 to AP pax_handler - RX 02b500090175736572 Test: Default request pax_handler - RX 020e00060300 Test: Default EAP-Failure PASS eap_proto_pax 1.978054 2022-06-15 22:03:22.807793 passed all 1 test case(s) 2022-06-15 22:03:22 ./run-tests.py eap_proto_pwd_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_pwd_errors 1/1 Test: EAP-pwd local error cases Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_pwd_errors 5.638138 2022-06-15 22:03:28.845326 passed all 1 test case(s) 2022-06-15 22:03:28 ./run-tests.py eap_proto_pwd_invalid_element DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_pwd_invalid_element 1/1 Test: EAP-pwd protocol tests - invalid server element Starting AP wlan3 Connect STA wlan0 to AP pwd_handler - RX 02f3000d017077642075736572 Test: Valid id exchange pwd_handler - RX 0202001734010013010100000000007077642075736572 Test: Commit payload with invalid element Starting AP wlan3 Connect STA wlan0 to AP pwd_handler - RX 02e3000d017077642075736572 Test: Valid id exchange pwd_handler - RX 0202001734010013010100000000007077642075736572 Test: Commit payload with invalid element Starting AP wlan3 Connect STA wlan0 to AP pwd_handler - RX 0257000d017077642075736572 Test: Valid id exchange pwd_handler - RX 0202001734010013010100000000007077642075736572 Test: Commit payload with invalid element Starting AP wlan3 Connect STA wlan0 to AP pwd_handler - RX 0224000d017077642075736572 Test: Valid id exchange pwd_handler - RX 0202001734010013010100000000007077642075736572 Test: Commit payload with invalid element Starting AP wlan3 Connect STA wlan0 to AP pwd_handler - RX 0213000d017077642075736572 Test: Valid id exchange pwd_handler - RX 0202001734010013010100000000007077642075736572 Test: Commit payload with invalid element Starting AP wlan3 Connect STA wlan0 to AP pwd_handler - RX 02bc000d017077642075736572 Test: Valid id exchange pwd_handler - RX 0202001734010013010100000000007077642075736572 Test: Commit payload with invalid element Starting AP wlan3 Connect STA wlan0 to AP pwd_handler - RX 0210000d017077642075736572 Test: Valid id exchange pwd_handler - RX 0202001734010013010100000000007077642075736572 Test: Commit payload with invalid element PASS eap_proto_pwd_invalid_element 2.029601 2022-06-15 22:03:31.269639 passed all 1 test case(s) 2022-06-15 22:03:31 ./run-tests.py eap_ttls_no_session_resumption DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_ttls_no_session_resumption 1/1 Test: EAP-TTLS session resumption disabled on server Starting AP wlan3 Connect STA wlan0 to AP PASS eap_ttls_no_session_resumption 0.318011 2022-06-15 22:03:31.984914 passed all 1 test case(s) 2022-06-15 22:03:32 ./run-tests.py fils_sk_pfs_25 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_pfs_25 1/1 Test: FILS SK with PFS (DH group 25) Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_sk_pfs_25 0.363309 2022-06-15 22:03:32.744493 passed all 1 test case(s) 2022-06-15 22:03:32 ./run-tests.py fils_sk_pfs_pmksa_caching DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_pfs_pmksa_caching 1/1 Test: FILS SK with PFS and PMKSA caching Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_sk_pfs_pmksa_caching 0.679389 2022-06-15 22:03:33.819751 passed all 1 test case(s) 2022-06-15 22:03:33 ./run-tests.py fils_sk_pmksa_caching_and_cache_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_pmksa_caching_and_cache_id 1/1 Test: FILS SK and PMKSA caching with Cache Identifier Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP Starting AP wlan4 (old add_ap argument type) PASS fils_sk_pmksa_caching_and_cache_id 0.423823 2022-06-15 22:03:34.640599 passed all 1 test case(s) 2022-06-15 22:03:34 ./run-tests.py fst_ap_initiate_session_response_with_reject DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_initiate_session_response_with_reject 1/1 Test: FST AP initiate session - response with reject Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Response with reject) PASS fst_ap_initiate_session_response_with_reject 0.487606 2022-06-15 22:03:35.524379 passed all 1 test case(s) 2022-06-15 22:03:35 ./run-tests.py fst_many_setup DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_many_setup 1/1 Test: FST setup multiple times Starting AP wlan3 Starting AP wlan4 Connect STA wlan5 to AP Connect STA wlan6 to AP PASS fst_many_setup 0.97691 2022-06-15 22:03:36.897808 passed all 1 test case(s) 2022-06-15 22:03:36 ./run-tests.py fst_sta_tear_down_session_bad_fsts_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_tear_down_session_bad_fsts_id 1/1 Test: FST STA tear down session - bad fsts id Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Bad fsts_id) PASS fst_sta_tear_down_session_bad_fsts_id 5.472101 2022-06-15 22:03:42.764205 passed all 1 test case(s) 2022-06-15 22:03:42 ./run-tests.py gas_max_pending DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_max_pending 1/1 Test: GAS and maximum pending query limit Starting AP wlan3 PASS gas_max_pending 0.212594 2022-06-15 22:03:43.373659 passed all 1 test case(s) 2022-06-15 22:03:43 ./run-tests.py go_neg_peers_force_diff_freq DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START go_neg_peers_force_diff_freq 1/1 Test: P2P channel selection when peers for different frequency Start GO negotiation wlan0 -> wlan1 wlan0: Trying to discover peer 02:00:00:00:01:00 go_neg_init_pbc thread caught an exception from p2p_go_neg_init: P2P_CONNECT failed PASS go_neg_peers_force_diff_freq 15.114435 2022-06-15 22:03:58.883851 passed all 1 test case(s) 2022-06-15 22:03:58 ./run-tests.py grpform DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform 1/1 Test: P2P group formation using PIN and authorized connection (init -> GO) Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS grpform 2.860541 2022-06-15 22:04:02.139523 passed all 1 test case(s) 2022-06-15 22:04:02 ./run-tests.py hapd_ctrl_attach_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_attach_errors 1/1 Test: hostapd ATTACH errors Starting AP wlan3 PASS hapd_ctrl_attach_errors 0.133274 2022-06-15 22:04:02.671511 passed all 1 test case(s) 2022-06-15 22:04:02 ./run-tests.py ieee8021x_eapol_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_eapol_key 1/1 Test: IEEE 802.1X connection and EAPOL-Key protocol tests Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_eapol_key 0.228108 2022-06-15 22:04:03.295781 passed all 1 test case(s) 2022-06-15 22:04:03 ./run-tests.py ieee8021x_wep40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_wep40 1/1 Test: IEEE 802.1X connection using dynamic WEP40 Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_wep40 0.282609 2022-06-15 22:04:03.978421 passed all 1 test case(s) 2022-06-15 22:04:04 ./run-tests.py macsec_hostapd_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_hostapd_psk 1/1 Test: MACsec PSK with hostapd ip link: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: mtu 1500 qdisc fq_codel state DOWN mode DEFAULT group default qlen 1000 link/ether 00:22:4d:81:6e:ce brd ff:ff:ff:ff:ff:ff altname eno1 altname enp0s25 3: eth1: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether b4:96:91:2e:ca:0c brd ff:ff:ff:ff:ff:ff altname enp1s0f0 4: eth2: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether b4:96:91:2e:ca:0d brd ff:ff:ff:ff:ff:ff altname enp1s0f1 5: eth3: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether b4:96:91:2e:ca:0e brd ff:ff:ff:ff:ff:ff altname enp1s0f2 6: eth4: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000 link/ether b4:96:91:2e:ca:0f brd ff:ff:ff:ff:ff:ff altname enp1s0f3 7: wlan0: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 8: wlan1: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff 9: wlan2: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff 10: wlan3: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff 11: wlan4: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff 12: wlan5: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff 13: wlan6: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff 14: hwsim0: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_hostapd_psk 0.25259 2022-06-15 22:04:04.630647 passed all 0 test case(s) skipped 1 test case(s) 2022-06-15 22:04:04 ./run-tests.py mbo_anqp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_anqp 1/1 Test: MBO ANQP Starting AP wlan3 PASS mbo_anqp 0.169154 2022-06-15 22:04:05.214783 passed all 1 test case(s) 2022-06-15 22:04:05 ./run-tests.py mesh_cnf_rcvd_event_cls_acpt DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_cnf_rcvd_event_cls_acpt 1/1 Test: Mesh peering management protocol testing - CLS_ACPT event in CNF_RCVD PASS mesh_cnf_rcvd_event_cls_acpt 0.574221 2022-06-15 22:04:06.182030 passed all 1 test case(s) 2022-06-15 22:04:06 ./run-tests.py mesh_secure_ccmp_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_ccmp_256 1/1 Test: Secure mesh with CCMP-256 PASS mesh_secure_ccmp_256 0.712841 2022-06-15 22:04:07.291769 passed all 1 test case(s) 2022-06-15 22:04:07 ./run-tests.py multi_ap_disabled_on_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_disabled_on_ap 1/1 Test: Multi-AP association attempt when disabled on AP Starting AP wlan3 Connect STA wlan0 to AP PASS multi_ap_disabled_on_ap 0.214283 2022-06-15 22:04:07.905554 passed all 1 test case(s) 2022-06-15 22:04:07 ./run-tests.py nfc_wps_password_token_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_password_token_ap 1/1 Test: WPS registrar configuring an AP using AP password token Starting AP wlan3 WPS configuration step PASS nfc_wps_password_token_ap 4.081582 2022-06-15 22:04:12.387292 passed all 1 test case(s) 2022-06-15 22:04:12 ./run-tests.py obss_coex_report_handling1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START obss_coex_report_handling1 1/1 Test: Overlapping BSS scan report handling with obss_interval=1 Starting AP wlan3 Connect STA wlan0 to AP PASS obss_coex_report_handling1 6.609638 2022-06-15 22:04:19.397688 passed all 1 test case(s) 2022-06-15 22:04:19 ./run-tests.py openssl_ecdh_curves DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START openssl_ecdh_curves 1/1 Test: OpenSSL ECDH curve configuration Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS openssl_ecdh_curves 0.667538 2022-06-15 22:04:20.463515 passed all 1 test case(s) 2022-06-15 22:04:20 ./run-tests.py p2p_channel_vht80p80_autogo DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_channel_vht80p80_autogo 1/1 Test: P2P autonomous GO and VHT 80+80 MHz channel PASS p2p_channel_vht80p80_autogo 0.932775 2022-06-15 22:04:21.794447 passed all 1 test case(s) 2022-06-15 22:04:21 ./run-tests.py p2p_device_grpform_timeout_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_device_grpform_timeout_go 1/1 Test: P2P group formation timeout on GO with cfg80211 P2P Device wlan0: Trying to discover peer 42:00:00:00:07:00 wlan7: Trying to discover peer 02:00:00:00:00:00 Remaining interfaces: p2p-dev-wlan7 wlan7 PASS p2p_device_grpform_timeout_go 10.97605 2022-06-15 22:04:33.166840 passed all 1 test case(s) 2022-06-15 22:04:33 ./run-tests.py p2p_device_incorrect_command_interface2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_device_incorrect_command_interface2 1/1 Test: cfg80211 P2P Device and P2P_GROUP_ADD command on incorrect interface Group results: {'result': 'success', 'ifname': 'p2p-wlan7-0', 'role': 'GO', 'ssid': 'DIRECT-6H', 'freq': '2462', 'persistent': False, 'passphrase': '9HvDGd8E', 'go_dev_addr': '42:00:00:00:08:00'} PASS p2p_device_incorrect_command_interface2 0.30568 2022-06-15 22:04:33.872452 passed all 1 test case(s) 2022-06-15 22:04:33 ./run-tests.py p2p_msg_empty DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_msg_empty 1/1 Test: P2P protocol test: empty P2P Public Action frame Starting AP wlan3 PASS p2p_msg_empty 0.330958 2022-06-15 22:04:34.606788 passed all 1 test case(s) 2022-06-15 22:04:34 ./run-tests.py p2p_service_discovery_external DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_service_discovery_external 1/1 Test: P2P service discovery using external response wlan1: Trying to discover peer 02:00:00:00:00:00 wlan1: Trying to discover peer 02:00:00:00:00:00 PASS p2p_service_discovery_external 0.619673 2022-06-15 22:04:35.626691 passed all 1 test case(s) 2022-06-15 22:04:35 ./run-tests.py p2p_service_discovery_fragmentation DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_service_discovery_fragmentation 1/1 Test: P2P service discovery with fragmentation wlan1: Trying to discover peer 02:00:00:00:00:00 wlan1: Trying to discover peer 02:00:00:00:00:00 PASS p2p_service_discovery_fragmentation 1.652316 2022-06-15 22:04:37.680082 passed all 1 test case(s) 2022-06-15 22:04:37 ./run-tests.py p2ps_connect_p2ps_method_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_connect_p2ps_method_2 1/1 Test: P2PS connection with P2PS method - group interface on dev0 PASS p2ps_connect_p2ps_method_2 0.832536 2022-06-15 22:04:38.908298 passed all 1 test case(s) 2022-06-15 22:04:38 ./run-tests.py p2ps_go_probe DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_go_probe 1/1 Test: P2PS GO discoverability on operating channel PASS p2ps_go_probe 0.822891 2022-06-15 22:04:40.129533 passed all 1 test case(s) 2022-06-15 22:04:40 ./run-tests.py radius_failover DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_failover 1/1 Test: RADIUS Authentication and Accounting server failover Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS radius_failover 21.34748 2022-06-15 22:05:01.874883 passed all 1 test case(s) 2022-06-15 22:05:01 ./run-tests.py radius_psk_invalid2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_psk_invalid2 1/1 Test: WPA2 with invalid PSK (hexstring) from RADIUS Starting AP wlan3 Connect STA wlan0 to AP Received authentication request PASS radius_psk_invalid2 1.211607 2022-06-15 22:05:03.485240 passed all 1 test case(s) 2022-06-15 22:05:03 ./run-tests.py rrm_beacon_req_active_no_ir DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_active_no_ir 1/1 Test: Beacon request - active scan mode and NO_IR channel Starting AP wlan3 Connect STA wlan0 to AP Beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=f2a098b683e1050064000114000372726d010882848b960c1218240301012a010432043048606c460570000000003b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00 fragment_id=0100 PASS rrm_beacon_req_active_no_ir 0.388209 2022-06-15 22:05:04.271040 passed all 1 test case(s) 2022-06-15 22:05:04 ./run-tests.py rrm_beacon_req_active_single_channel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_active_single_channel 1/1 Test: Beacon request - active scan mode with single channel Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Received beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=d620a5b683e1050064000114000372726d010882848b960c1218240301012a010432043048606c460570000000003b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00 fragment_id=0100 PASS rrm_beacon_req_active_single_channel 0.32091 2022-06-15 22:05:05.004100 passed all 1 test case(s) 2022-06-15 22:05:05 ./run-tests.py rrm_lci_req_ap_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_lci_req_ap_oom 1/1 Test: LCI report generation AP OOM and failure Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_lci_req_ap_oom 0.21193 2022-06-15 22:05:05.634474 passed all 1 test case(s) 2022-06-15 22:05:05 ./run-tests.py rrm_lci_req_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_lci_req_oom 1/1 Test: LCI report generation OOM Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_lci_req_oom 0.207203 2022-06-15 22:05:06.250336 passed all 1 test case(s) 2022-06-15 22:05:06 ./run-tests.py sae_commit_override DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_commit_override 1/1 Test: SAE commit override (hostapd) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_commit_override 1.163424 2022-06-15 22:05:07.808772 passed all 1 test case(s) 2022-06-15 22:05:07 ./run-tests.py sae_confirm_immediate2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_confirm_immediate2 1/1 Test: SAE and AP sending Confirm message without waiting STA (2) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_confirm_immediate2 0.260033 2022-06-15 22:05:08.468434 passed all 1 test case(s) 2022-06-15 22:05:08 ./run-tests.py sae_h2e_rsnxe_mismatch_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_h2e_rsnxe_mismatch_ap 1/1 Test: SAE H2E and RSNXE mismatch in EAPOL-Key msg 3/4 Starting AP wlan3 Connect STA wlan0 to AP PASS sae_h2e_rsnxe_mismatch_ap 0.232077 2022-06-15 22:05:09.096684 passed all 1 test case(s) 2022-06-15 22:05:09 ./run-tests.py sae_pk_group_20_sae_group_21 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_group_20_sae_group_21 1/1 Test: SAE-PK with group 20 with SAE group 21 Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pk_group_20_sae_group_21 0.345215 2022-06-15 22:05:09.841538 passed all 1 test case(s) 2022-06-15 22:05:09 ./run-tests.py sigma_dut_ap_eap_osen DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_eap_osen 1/1 Test: sigma_dut controlled AP with EAP+OSEN Skip test case: sigma_dut not available SKIP sigma_dut_ap_eap_osen 0.145652 2022-06-15 22:05:10.387932 passed all 0 test case(s) skipped 1 test case(s) 2022-06-15 22:05:10 ./run-tests.py sigma_dut_ap_owe_transition_mode_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_owe_transition_mode_2 1/1 Test: sigma_dut controlled AP with OWE and transition mode (2) Skip test case: sigma_dut not available SKIP sigma_dut_ap_owe_transition_mode_2 0.150093 2022-06-15 22:05:10.936810 passed all 0 test case(s) skipped 1 test case(s) 2022-06-15 22:05:10 ./run-tests.py sigma_dut_dpp_self_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_self_config 1/1 Test: sigma_dut DPP Configurator enrolling an AP and using self-configuration Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_dpp_self_config 0.136439 2022-06-15 22:05:11.473178 passed all 0 test case(s) skipped 1 test case(s) 2022-06-15 22:05:11 ./run-tests.py sigma_dut_dpp_tcp_conf_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_tcp_conf_resp 1/1 Test: sigma_dut DPP TCP Configurator (Controller) as responder Skip test case: sigma_dut not available SKIP sigma_dut_dpp_tcp_conf_resp 0.108696 2022-06-15 22:05:11.981029 passed all 0 test case(s) skipped 1 test case(s) 2022-06-15 22:05:12 ./run-tests.py sigma_dut_ocv DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ocv 1/1 Test: sigma_dut controlled STA using OCV Skip test case: sigma_dut not available SKIP sigma_dut_ocv 0.108466 2022-06-15 22:05:12.488649 passed all 0 test case(s) skipped 1 test case(s) 2022-06-15 22:05:12 ./run-tests.py wep_he DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wep_he 1/1 Test: WEP and HE Starting AP wlan3 Connect STA wlan0 to AP hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy3', 'freq': '2412', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '0', 'num_sta_no_short_preamble': '0', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '1', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x13', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '1', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '0', 'ieee80211n': '0', 'ieee80211ac': '0', 'ieee80211ax': '0', 'ieee80211be': '0', 'beacon_int': '100', 'dtim_period': '2', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'max_txpower': '20', 'bss[0]': 'wlan3', 'bssid[0]': '02:00:00:00:03:00', 'ssid[0]': 'test-he-wep', 'num_sta[0]': '1'} PASS wep_he 0.338536 2022-06-15 22:05:13.225415 passed all 1 test case(s) 2022-06-15 22:05:13 ./run-tests.py wnm_bss_transition_mgmt_query_with_unknown_candidates DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_transition_mgmt_query_with_unknown_candidates 1/1 Test: WNM BSS Transition Management query with unknown candidates Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_bss_transition_mgmt_query_with_unknown_candidates 0.225215 2022-06-15 22:05:13.864023 passed all 1 test case(s) 2022-06-15 22:05:13 ./run-tests.py wnm_sleep_mode_rsn_pmf_key_workaround DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_sleep_mode_rsn_pmf_key_workaround 1/1 Test: WNM Sleep Mode - RSN with PMF and GTK/IGTK workaround Starting AP wlan3 Connect STA wlan0 to AP Going to WNM Sleep Mode Waking up from WNM Sleep Mode PASS wnm_sleep_mode_rsn_pmf_key_workaround 0.527366 2022-06-15 22:05:14.807993 passed all 1 test case(s) 2022-06-15 22:05:14 ./run-tests.py wpas_ctrl_enable_disable_network DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_enable_disable_network 1/1 Test: wpa_supplicant ctrl_iface ENABLE/DISABLE_NETWORK Starting AP wlan3 Connect STA wlan0 to AP PASS wpas_ctrl_enable_disable_network 0.379879 2022-06-15 22:05:15.604609 passed all 1 test case(s) 2022-06-15 22:05:15 ./run-tests.py wpas_ctrl_pno DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_pno 1/1 Test: wpa_supplicant ctrl_iface pno PASS wpas_ctrl_pno 0.116584 2022-06-15 22:05:16.134248 passed all 1 test case(s) 2022-06-15 22:05:16 ./run-tests.py wpas_ctrl_preauth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_preauth 1/1 Test: wpa_supplicant ctrl_iface preauth PASS wpas_ctrl_preauth 0.138441 2022-06-15 22:05:16.687056 passed all 1 test case(s) 2022-06-15 22:05:16 ./run-tests.py wpas_ctrl_set_tdls_trigger_control DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_set_tdls_trigger_control 1/1 Test: wpa_supplicant SET tdls_trigger_control PASS wpas_ctrl_set_tdls_trigger_control 0.134661 2022-06-15 22:05:17.234218 passed all 1 test case(s) 2022-06-15 22:05:17 ./run-tests.py wps_ext_cred_proto_auth_type_missing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_cred_proto_auth_type_missing 1/1 Test: WPS and Credential: Auth Type missing Starting AP wlan3 PASS wps_ext_cred_proto_auth_type_missing 0.301153 2022-06-15 22:05:17.947273 passed all 1 test case(s) 2022-06-15 22:05:17 ./stop.sh