2022-07-04 13:03:21 export USER=root 2022-07-04 13:03:21 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client osu_client.c: In function ‘cmd_osu_select’: osu_client.c:2090:44: warning: ‘%s’ directive output may be truncated writing up to 985 bytes into a region of size 4 [-Wformat-truncation=] 2090 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 14); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~ osu_client.c:2090:4: note: ‘snprintf’ output between 1 and 986 bytes into a destination of size 4 2090 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 14); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2103:44: warning: ‘%s’ directive output may be truncated writing up to 994 bytes into a region of size 4 [-Wformat-truncation=] 2103 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 5); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~ osu_client.c:2103:4: note: ‘snprintf’ output between 1 and 995 bytes into a destination of size 4 2103 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 5); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2077:10: warning: ‘%s’ directive output may be truncated writing up to 990 bytes into a region of size 256 [-Wformat-truncation=] 2077 | "%s", buf + 9); | ^~ In file included from ../../src/utils/common.h:12, from osu_client.c:16: ../../src/utils/os.h:552:21: note: ‘snprintf’ output between 1 and 991 bytes into a destination of size 256 552 | #define os_snprintf snprintf osu_client.c:2076:4: note: in expansion of macro ‘os_snprintf’ 2076 | os_snprintf(last->osu_nai2, sizeof(last->osu_nai2), | ^~~~~~~~~~~ osu_client.c:2071:10: warning: ‘%s’ directive output may be truncated writing up to 991 bytes into a region of size 256 [-Wformat-truncation=] 2071 | "%s", buf + 8); | ^~ In file included from ../../src/utils/common.h:12, from osu_client.c:16: ../../src/utils/os.h:552:21: note: ‘snprintf’ output between 1 and 992 bytes into a destination of size 256 552 | #define os_snprintf snprintf osu_client.c:2070:4: note: in expansion of macro ‘os_snprintf’ 2070 | os_snprintf(last->osu_nai, sizeof(last->osu_nai), | ^~~~~~~~~~~ osu_client.c:2065:7: warning: ‘%s’ directive output may be truncated writing up to 989 bytes into a region of size 33 [-Wformat-truncation=] 2064 | snprintf(last->osu_ssid2, sizeof(last->osu_ssid2), | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2065 | "%s", buf + 10); | ~^~~~~~~~~~~~~~ osu_client.c:2064:4: note: ‘snprintf’ output between 1 and 990 bytes into a destination of size 33 2064 | snprintf(last->osu_ssid2, sizeof(last->osu_ssid2), | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2065 | "%s", buf + 10); | ~~~~~~~~~~~~~~~ osu_client.c:2059:7: warning: ‘%s’ directive output may be truncated writing up to 990 bytes into a region of size 33 [-Wformat-truncation=] 2058 | snprintf(last->osu_ssid, sizeof(last->osu_ssid), | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2059 | "%s", buf + 9); | ~^~~~~~~~~~~~~ osu_client.c:2058:4: note: ‘snprintf’ output between 1 and 991 bytes into a destination of size 33 2058 | snprintf(last->osu_ssid, sizeof(last->osu_ssid), | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2059 | "%s", buf + 9); | ~~~~~~~~~~~~~~ osu_client.c:2048:44: warning: ‘%s’ directive output may be truncated writing up to 995 bytes into a region of size 256 [-Wformat-truncation=] 2048 | snprintf(last->url, sizeof(last->url), "%s", buf + 4); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~ osu_client.c:2048:4: note: ‘snprintf’ output between 1 and 996 bytes into a destination of size 256 2048 | snprintf(last->url, sizeof(last->url), "%s", buf + 4); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2040:48: warning: ‘%s’ directive output may be truncated writing up to 986 bytes into a region of size 20 [-Wformat-truncation=] 2040 | snprintf(last->bssid, sizeof(last->bssid), "%s", | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~ 2041 | buf + 13); | ~~~~~~~~~ osu_client.c:2040:4: note: ‘snprintf’ output between 1 and 987 bytes into a destination of size 20 2040 | snprintf(last->bssid, sizeof(last->bssid), "%s", | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2041 | buf + 13); | ~~~~~~~~~ Building hostapd Building wpa_supplicant 2022-07-04 13:04:03 ./start.sh 2022-07-04 13:04:04 ./run-tests.py ap_ft_ap_oom3b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_ap_oom3b 1/1 Test: WPA2-PSK-FT and AP OOM 3b Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 PASS ap_ft_ap_oom3b 0.498852 2022-07-04 13:04:06.417688 passed all 1 test case(s) 2022-07-04 13:04:06 ./run-tests.py ap_ft_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_sae 1/1 Test: WPA2-PSK-FT-SAE AP Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_sae 0.709128 2022-07-04 13:04:07.536649 passed all 1 test case(s) 2022-07-04 13:04:07 ./run-tests.py ap_ft_sae_over_ds_ptk_rekey0 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_sae_over_ds_ptk_rekey0 1/1 Test: WPA2-PSK-FT-SAE AP over DS and PTK rekey triggered by station Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP PASS ap_ft_sae_over_ds_ptk_rekey0 1.637239 2022-07-04 13:04:09.580453 passed all 1 test case(s) 2022-07-04 13:04:09 ./run-tests.py ap_ft_vlan_over_ds_many DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_vlan_over_ds_many 1/1 Test: WPA2-PSK-FT AP over DS with VLAN multiple times Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP Roam to the second AP Roam back to the first AP PASS ap_ft_vlan_over_ds_many 8.881027 2022-07-04 13:04:18.859956 passed all 1 test case(s) 2022-07-04 13:04:18 ./run-tests.py ap_hs20_eap_cert_unknown DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_eap_cert_unknown 1/1 Test: Hotspot 2.0 connection with certificate, but unknown EAP method Starting AP wlan3 PASS ap_hs20_eap_cert_unknown 0.18839 2022-07-04 13:04:19.449430 passed all 1 test case(s) 2022-07-04 13:04:19 ./run-tests.py ap_hs20_eap_ttls_chap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_eap_ttls_chap 1/1 Test: Hotspot 2.0 connection with TTLS/CHAP Starting AP wlan3 PASS ap_hs20_eap_ttls_chap 0.401557 2022-07-04 13:04:20.254050 passed all 1 test case(s) 2022-07-04 13:04:20 ./run-tests.py ap_hs20_fetch_osu_single_ssid2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_fetch_osu_single_ssid2 1/1 Test: Hotspot 2.0 OSU provider and single SSID (two OSU providers) Starting AP wlan3 OSU-PROVIDER 02:00:00:00:03:00 uri=https://example.com/osu/ methods=00000002 osu_ssid=HS 2.0 OSU open osu_ssid2=test-hs20 osu_nai2=osen@example.com friendly_name=eng:Test OSU friendly_name=fin:Testi-OSU desc=eng:Example services desc=fin:Esimerkkipalveluja OSU-PROVIDER 02:00:00:00:03:00 uri=https://another.example.com/osu/ methods=00000002 osu_ssid=HS 2.0 OSU open osu_ssid2=test-hs20 osu_nai2=osen@another.example.com PASS ap_hs20_fetch_osu_single_ssid2 3.902805 2022-07-04 13:04:24.557946 passed all 1 test case(s) 2022-07-04 13:04:24 ./run-tests.py ap_hs20_interworking_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_interworking_oom 1/1 Test: Hotspot 2.0 network selection and OOM Starting AP wlan3 PASS ap_hs20_interworking_oom 0.701398 2022-07-04 13:04:25.657891 passed all 1 test case(s) 2022-07-04 13:04:25 ./run-tests.py ap_hs20_min_bandwidth_home2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_min_bandwidth_home2 1/1 Test: Hotspot 2.0 network selection with min bandwidth - special cases Starting AP wlan3 WAN link at capacity Downlink/Uplink Load was not measured Uplink and Downlink max values PASS ap_hs20_min_bandwidth_home2 0.321574 2022-07-04 13:04:26.376470 passed all 1 test case(s) 2022-07-04 13:04:26 ./run-tests.py ap_hs20_network_preference4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_network_preference4 1/1 Test: Hotspot 2.0 network selection with username vs. SIM credential Starting AP wlan3 Starting AP wlan4 PASS ap_hs20_network_preference4 0.566462 2022-07-04 13:04:27.337704 passed all 1 test case(s) 2022-07-04 13:04:27 ./run-tests.py ap_hs20_sim_imsi_privacy DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_sim_imsi_privacy 1/1 Test: Hotspot 2.0 with simulated SIM and EAP-SIM with IMSI privacy Starting AP wlan3 PASS ap_hs20_sim_imsi_privacy 0.325162 2022-07-04 13:04:28.058974 passed all 1 test case(s) 2022-07-04 13:04:28 ./run-tests.py ap_hs20_sim_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_sim_oom 1/1 Test: Hotspot 2.0 with simulated SIM and EAP-SIM - OOM Starting AP wlan3 PASS ap_hs20_sim_oom 0.230604 2022-07-04 13:04:28.684227 passed all 1 test case(s) 2022-07-04 13:04:28 ./run-tests.py ap_open_poll_sta_no_ack DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_poll_sta_no_ack 1/1 Test: AP with open mode and STA poll without ACK Starting AP wlan3 Connect STA wlan0 to AP PASS ap_open_poll_sta_no_ack 1.206923 2022-07-04 13:04:30.286859 passed all 1 test case(s) 2022-07-04 13:04:30 ./run-tests.py ap_open_tdls_vht80 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_tdls_vht80 1/1 Test: Open AP and two stations using TDLS with VHT 80 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS Station dump on dev[0]: Station 02:00:00:00:03:00 (on wlan0) inactive time: 77 ms rx bytes: 150872 rx packets: 173 tx bytes: 64625 tx packets: 53 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 26 rx drop misc: 29 signal: -27 dBm signal avg: -27 dBm beacon signal avg: -27 dBm tx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 tx duration: 0 us rx bitrate: 81.0 MBit/s VHT-MCS 1 40MHz VHT-NSS 3 rx duration: 0 us expected throughput: 9.704Mbps authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 3 seconds associated at [boottime]: 101.879s associated at: 1656939871160 ms current time: 1656939873867 ms Station 02:00:00:00:01:00 (on wlan0) inactive time: 119 ms rx bytes: 18306 rx packets: 16 tx bytes: 18306 tx packets: 14 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 26 rx drop misc: 0 signal: -27 dBm signal avg: -27 dBm beacon signal avg: -27 dBm tx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 tx duration: 0 us rx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 rx duration: 0 us expected throughput: 9.704Mbps authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: yes DTIM period: 2 beacon interval:100 short slot time:yes connected time: 2 seconds associated at [boottime]: 102.169s associated at: 1656939871450 ms current time: 1656939873867 ms Station dump on dev[1]: Station 02:00:00:00:03:00 (on wlan0) inactive time: 87 ms rx bytes: 150872 rx packets: 173 tx bytes: 64625 tx packets: 53 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 26 rx drop misc: 29 signal: -27 dBm signal avg: -27 dBm beacon signal avg: -27 dBm tx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 tx duration: 0 us rx bitrate: 81.0 MBit/s VHT-MCS 1 40MHz VHT-NSS 3 rx duration: 0 us expected throughput: 9.704Mbps authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: no DTIM period: 2 beacon interval:100 short slot time:yes connected time: 3 seconds associated at [boottime]: 101.879s associated at: 1656939871160 ms current time: 1656939873877 ms Station 02:00:00:00:01:00 (on wlan0) inactive time: 129 ms rx bytes: 18306 rx packets: 16 tx bytes: 18306 tx packets: 14 tx retries: 0 tx failed: 0 beacon loss: 0 beacon rx: 26 rx drop misc: 0 signal: -27 dBm signal avg: -27 dBm beacon signal avg: -27 dBm tx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 tx duration: 0 us rx bitrate: 13.0 MBit/s VHT-MCS 1 VHT-NSS 1 rx duration: 0 us expected throughput: 9.704Mbps authorized: yes authenticated: yes associated: yes preamble: long WMM/WME: yes MFP: no TDLS peer: yes DTIM period: 2 beacon interval:100 short slot time:yes connected time: 2 seconds associated at [boottime]: 102.169s associated at: 1656939871450 ms current time: 1656939873877 ms PASS ap_open_tdls_vht80 3.541328 2022-07-04 13:04:34.225848 passed all 1 test case(s) 2022-07-04 13:04:34 ./run-tests.py ap_pmf_assoc_comeback2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_assoc_comeback2 1/1 Test: WPA2-PSK AP with PMF association comeback (using DROP_SA) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_pmf_assoc_comeback2 1.525352 2022-07-04 13:04:36.147516 passed all 1 test case(s) 2022-07-04 13:04:36 ./run-tests.py ap_pmf_required_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_required_eap 1/1 Test: WPA2-EAP AP with PMF required Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_pmf_required_eap 0.414775 2022-07-04 13:04:36.959089 passed all 1 test case(s) 2022-07-04 13:04:36 ./run-tests.py ap_tdls_chan_switch_prohibit DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_tdls_chan_switch_prohibit 1/1 Test: Open AP and TDLS channel switch prohibited Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Setup TDLS PASS ap_tdls_chan_switch_prohibit 1.825471 2022-07-04 13:04:39.181947 passed all 1 test case(s) 2022-07-04 13:04:39 ./run-tests.py ap_vht_csa_vht80p80 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht_csa_vht80p80 1/1 Test: VHT CSA with VHT80+80 getting enabled Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP SIGNAL_POLL(1): ['RSSI=-27', 'LINKSPEED=6', 'NOISE=-92', 'FREQUENCY=5180', 'WIDTH=80+80 MHz', 'CENTER_FRQ1=5210', 'CENTER_FRQ2=5775', 'AVG_RSSI=-27', 'AVG_BEACON_RSSI=-27'] SIGNAL_POLL(0): ['RSSI=-27', 'LINKSPEED=6', 'NOISE=9999', 'FREQUENCY=5180', 'WIDTH=40 MHz', 'CENTER_FRQ1=5190', 'AVG_RSSI=-26', 'AVG_BEACON_RSSI=-26'] PASS ap_vht_csa_vht80p80 1.746341 2022-07-04 13:04:41.325614 passed all 1 test case(s) 2022-07-04 13:04:41 ./run-tests.py ap_wds_sta_wep DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wds_sta_wep 1/1 Test: WEP AP with STA using 4addr mode Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wds_sta_wep 0.683875 2022-07-04 13:04:42.403261 passed all 1 test case(s) 2022-07-04 13:04:42 ./run-tests.py ap_wmm_uapsd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wmm_uapsd 1/1 Test: AP with U-APSD advertisement Starting AP wlan3 Connect STA wlan0 to AP dev1->dev2 unicast data delivery failed Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_params.py", line 876, in test_ap_wmm_uapsd hwsim_utils.test_connectivity(dev[0], hapd) File "/lkp/benchmarks/hwsim/tests/hwsim/hwsim_utils.py", line 195, in test_connectivity raise Exception(last_err) Exception: dev1->dev2 unicast data delivery failed FAIL ap_wmm_uapsd 5.262111 2022-07-04 13:04:48.064412 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_wmm_uapsd 2022-07-04 13:04:48 ./run-tests.py ap_wpa2_eap_fast_mschapv2_unauth_prov DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_mschapv2_unauth_prov 1/1 Test: WPA2-Enterprise connection using EAP-FAST/MSCHAPv2 and unauthenticated provisioning Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_fast_mschapv2_unauth_prov 0.553996 2022-07-04 13:04:49.016085 passed all 1 test case(s) 2022-07-04 13:04:49 ./run-tests.py ap_wpa2_eap_fast_prov DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_fast_prov 1/1 Test: EAP-FAST and provisioning options Starting AP wlan3 Provisioning attempt while server has provisioning disabled Connect STA wlan0 to AP Authenticated provisioning Provisioning disabled - using previously provisioned PAC Drop PAC and verify connection failure Anonymous provisioning Provisioning disabled - using previously provisioned PAC PASS ap_wpa2_eap_fast_prov 0.967834 2022-07-04 13:04:50.386248 passed all 1 test case(s) 2022-07-04 13:04:50 ./run-tests.py ap_wpa2_eap_no_workaround DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_no_workaround 1/1 Test: WPA2-Enterprise connection using EAP-TTLS and eap_workaround=0 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_no_workaround 0.303168 2022-07-04 13:04:51.087799 passed all 1 test case(s) 2022-07-04 13:04:51 ./run-tests.py ap_wpa2_eap_sim DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sim 1/1 Test: WPA2-Enterprise connection using EAP-SIM Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Negative test with incorrect key Connect STA wlan0 to AP Invalid GSM-Milenage key Connect STA wlan0 to AP Invalid GSM-Milenage key(2) Connect STA wlan0 to AP Invalid GSM-Milenage key(3) Connect STA wlan0 to AP Invalid GSM-Milenage key(4) Connect STA wlan0 to AP Missing key configuration Connect STA wlan0 to AP PASS ap_wpa2_eap_sim 0.791206 2022-07-04 13:04:52.274777 passed all 1 test case(s) 2022-07-04 13:04:52 ./run-tests.py ap_wpa2_eap_sim_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sim_config 1/1 Test: EAP-SIM configuration options Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_wpa2_eap_sim_config 0.452603 2022-07-04 13:04:53.124399 passed all 1 test case(s) 2022-07-04 13:04:53 ./run-tests.py ap_wpa2_eap_tls_ocsp_invalid_data DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_ocsp_invalid_data 1/1 Test: WPA2-Enterprise connection using EAP-TLS and invalid OCSP data Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_ocsp_invalid_data 0.247366 2022-07-04 13:04:53.767344 passed all 1 test case(s) 2022-07-04 13:04:53 ./run-tests.py ap_wpa2_eap_too_many_roundtrips DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_too_many_roundtrips 1/1 Test: WPA2-Enterprise connection resulting in too many EAP roundtrips Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_too_many_roundtrips 0.334826 2022-07-04 13:04:54.499688 passed all 1 test case(s) 2022-07-04 13:04:54 ./run-tests.py ap_wpa2_eap_ttls_eap_gtc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_eap_gtc 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/EAP-GTC Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_eap_gtc 0.33678 2022-07-04 13:04:55.233592 passed all 1 test case(s) 2022-07-04 13:04:55 ./run-tests.py ap_wpa2_eap_ttls_pap_subject_match DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_ttls_pap_subject_match 1/1 Test: WPA2-Enterprise connection using EAP-TTLS/PAP and (alt)subject_match Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_ttls_pap_subject_match 0.292422 2022-07-04 13:04:55.921972 passed all 1 test case(s) 2022-07-04 13:04:55 ./run-tests.py ap_wpa2_psk_supp_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_supp_proto 1/1 Test: WPA2-PSK 4-way handshake protocol testing for supplicant Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_supp_proto 0.22436 2022-07-04 13:04:56.543096 passed all 1 test case(s) 2022-07-04 13:04:56 ./run-tests.py ap_wpa2_ptk_rekey DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_ptk_rekey 1/1 Test: WPA2-PSK AP and PTK rekey enforced by station Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_ptk_rekey 1.310514 2022-07-04 13:04:58.250689 passed all 1 test case(s) 2022-07-04 13:04:58 ./run-tests.py ap_wps_authenticator_mismatch_m4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_authenticator_mismatch_m4 1/1 Test: WPS and Authenticator attribute mismatch in M4 Starting AP wlan3 PASS ap_wps_authenticator_mismatch_m4 0.259972 2022-07-04 13:04:58.909484 passed all 1 test case(s) 2022-07-04 13:04:58 ./run-tests.py ap_wps_auto_setup_with_config_file DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_auto_setup_with_config_file 1/1 Test: WPS auto-setup with configuration file Starting BSS phy=phy3 ifname=wlan3 PASS ap_wps_auto_setup_with_config_file 0.361894 2022-07-04 13:04:59.667999 passed all 1 test case(s) 2022-07-04 13:04:59 ./run-tests.py ap_wps_config_without_wps DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_config_without_wps 1/1 Test: AP configuration attempt using wps_config when WPS is disabled Starting AP wlan3 PASS ap_wps_config_without_wps 0.132067 2022-07-04 13:05:00.197979 passed all 1 test case(s) 2022-07-04 13:05:00 ./run-tests.py ap_wps_er_add_enrollee DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_add_enrollee 1/1 Test: WPS ER configuring AP and adding a new enrollee using PIN Starting AP wlan3 WPS configuration step Start ER Learn AP configuration through UPnP Add Enrollee using ER Add a specific Enrollee using ER Verify registrar selection behavior Stop ER PASS ap_wps_er_add_enrollee 11.690898 2022-07-04 13:05:12.300509 passed all 1 test case(s) 2022-07-04 13:05:12 ./run-tests.py ap_wps_er_http_proto_no_control_url DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto_no_control_url 1/1 Test: WPS ER HTTP protocol testing - no controlURL HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 PASS ap_wps_er_http_proto_no_control_url 2.108484 2022-07-04 13:05:14.816082 passed all 1 test case(s) 2022-07-04 13:05:14 ./run-tests.py ap_wps_er_multi_add_enrollee DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_multi_add_enrollee 1/1 Test: Multiple WPS ERs adding a new enrollee using PIN Starting AP wlan3 PASS ap_wps_er_multi_add_enrollee 2.986055 2022-07-04 13:05:18.200580 passed all 1 test case(s) 2022-07-04 13:05:18 ./run-tests.py ap_wps_m2_unknown_opcode DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_m2_unknown_opcode 1/1 Test: WPS and M2 but unknown opcode Starting AP wlan3 PASS ap_wps_m2_unknown_opcode 0.316833 2022-07-04 13:05:18.914909 passed all 1 test case(s) 2022-07-04 13:05:18 ./run-tests.py ap_wps_pk_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_pk_oom 1/1 Test: WPS and public key OOM Starting AP wlan3 PASS ap_wps_pk_oom 0.332976 2022-07-04 13:05:19.642354 passed all 1 test case(s) 2022-07-04 13:05:19 ./run-tests.py ap_wps_upnp_http_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_upnp_http_proto 1/1 Test: WPS AP and UPnP/HTTP protocol testing Starting AP wlan3 PASS ap_wps_upnp_http_proto 1.379636 2022-07-04 13:05:21.420642 passed all 1 test case(s) 2022-07-04 13:05:21 ./run-tests.py authsrv_testing_options DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START authsrv_testing_options 1/1 Test: Authentication server and testing options Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS authsrv_testing_options 0.947691 2022-07-04 13:05:22.764630 passed all 1 test case(s) 2022-07-04 13:05:22 ./run-tests.py autogo_join_before_found DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_join_before_found 1/1 Test: P2P client joining a group before having found GO Device Address Start autonomous GO wlan0 PASS autogo_join_before_found 0.416032 2022-07-04 13:05:23.579968 passed all 1 test case(s) 2022-07-04 13:05:23 ./run-tests.py dbus_autoscan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_autoscan 1/1 Test: D-Bus Autoscan() PASS dbus_autoscan 0.109928 2022-07-04 13:05:24.091323 passed all 1 test case(s) 2022-07-04 13:05:24 ./run-tests.py dbus_p2p_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_p2p_config 1/1 Test: D-Bus Get/Set P2PDeviceConfig PASS dbus_p2p_config 0.114633 2022-07-04 13:05:24.607100 passed all 1 test case(s) 2022-07-04 13:05:24 ./run-tests.py dbus_p2p_go_neg_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_p2p_go_neg_auth 1/1 Test: D-Bus P2P GO Negotiation authorized wlan1: Trying to discover peer 02:00:00:00:00:00 PASS dbus_p2p_go_neg_auth 0.79517 2022-07-04 13:05:25.799140 passed all 1 test case(s) 2022-07-04 13:05:25 ./run-tests.py discovery_dev_type DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START discovery_dev_type 1/1 Test: P2P device discovery with Device Type filter PASS discovery_dev_type 1.530712 2022-07-04 13:05:27.730831 passed all 1 test case(s) 2022-07-04 13:05:27 ./run-tests.py dpp_auth_req_stop_after_ack DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_auth_req_stop_after_ack 1/1 Test: DPP initiator stopping after ACK, but no response PASS dpp_auth_req_stop_after_ack 2.119726 2022-07-04 13:05:30.247798 passed all 1 test case(s) 2022-07-04 13:05:30 ./run-tests.py dpp_conf_file_update DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_conf_file_update 1/1 Test: DPP provisioning updating wpa_supplicant configuration file dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_conf_file_update 0.234863 2022-07-04 13:05:30.880393 passed all 1 test case(s) 2022-07-04 13:05:30 ./run-tests.py dpp_config_connector_error_net_access_key_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_connector_error_net_access_key_mismatch 1/1 Test: DPP Config Object connector error - netAccessKey mismatch r=1ab7e0bee95eeefa7b06bb6124f3650c57ded0f987fc55b9c8daca774ded1ba4 s=75fcb7e6a1b6ee164cfd954cdfc44eacf4f9aa6767108ded70c0489dd3d9d52e dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_connector_error_net_access_key_mismatch 0.121987 2022-07-04 13:05:31.399858 passed all 1 test case(s) 2022-07-04 13:05:31 ./run-tests.py dpp_config_dpp_gen_secp521r1_secp521r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_gen_secp521r1_secp521r1 1/1 Test: Generate DPP Config Object for DPP network (P-521 + P-521) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_gen_secp521r1_secp521r1 0.128248 2022-07-04 13:05:31.931386 passed all 1 test case(s) 2022-07-04 13:05:31 ./run-tests.py dpp_config_jwk_error_invalid_x DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jwk_error_invalid_x 1/1 Test: DPP Config Object JWK error - invalid x dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jwk_error_invalid_x 0.119874 2022-07-04 13:05:32.452772 passed all 1 test case(s) 2022-07-04 13:05:32 ./run-tests.py dpp_config_jwk_error_no_kid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jwk_error_no_kid 1/1 Test: DPP Config Object JWK error - no kid dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jwk_error_no_kid 0.121803 2022-07-04 13:05:32.975782 passed all 1 test case(s) 2022-07-04 13:05:33 ./run-tests.py dpp_config_jws_error_prot_hdr_unexpected_kid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jws_error_prot_hdr_unexpected_kid 1/1 Test: DPP Config Object JWS error - protected header - unexpected kid dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jws_error_prot_hdr_unexpected_kid 0.11931 2022-07-04 13:05:33.490545 passed all 1 test case(s) 2022-07-04 13:05:33 ./run-tests.py dpp_config_save2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_save2 1/1 Test: DPP configuration saving (2) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication Saved configuration: ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=adm update_config=1 dpp_config_processing=1 network={ ssid=012a psk="secret passphrase" key_mgmt=WPA-PSK FT-PSK WPA-PSK-SHA256 mesh_fwding=1 disabled=1 ieee80211w=1 } PASS dpp_config_save2 0.177198 2022-07-04 13:05:34.071106 passed all 1 test case(s) 2022-07-04 13:05:34 ./run-tests.py dpp_config_signed_connector_error_no_dot_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_signed_connector_error_no_dot_1 1/1 Test: DPP Config Object signedConnector error - no dot(1) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_signed_connector_error_no_dot_1 0.119307 2022-07-04 13:05:34.586475 passed all 1 test case(s) 2022-07-04 13:05:34 ./run-tests.py dpp_pkex_identifier_mismatch2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_identifier_mismatch2 1/1 Test: DPP and PKEX with initiator using identifier and the responder not PASS dpp_pkex_identifier_mismatch2 1.211081 2022-07-04 13:05:36.198031 passed all 1 test case(s) 2022-07-04 13:05:36 ./run-tests.py dpp_pkex_v2_hostapd_responder DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_v2_hostapd_responder 1/1 Test: DPP PKEXv2 with hostapd as responder Skip test case: DPP version 3 not supported SKIP dpp_pkex_v2_hostapd_responder 0.10236 2022-07-04 13:05:36.703047 passed all 0 test case(s) skipped 1 test case(s) 2022-07-04 13:05:36 ./run-tests.py dpp_proto_after_wrapped_data_conf_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_after_wrapped_data_conf_req 1/1 Test: DPP protocol testing - attribute after Wrapped Data in Conf Req PASS dpp_proto_after_wrapped_data_conf_req 0.114997 2022-07-04 13:05:37.218306 passed all 1 test case(s) 2022-07-04 13:05:37 ./run-tests.py dpp_proto_auth_req_no_wrapped_data DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_req_no_wrapped_data 1/1 Test: DPP protocol testing - no Wrapped Data in Auth Req PASS dpp_proto_auth_req_no_wrapped_data 0.211609 2022-07-04 13:05:37.831674 passed all 1 test case(s) 2022-07-04 13:05:37 ./run-tests.py dpp_proto_conf_resp_e_nonce_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_conf_resp_e_nonce_mismatch 1/1 Test: DPP protocol testing - E-nonce mismatch in Conf Resp PASS dpp_proto_conf_resp_e_nonce_mismatch 0.117673 2022-07-04 13:05:38.346213 passed all 1 test case(s) 2022-07-04 13:05:38 ./run-tests.py dpp_qr_code_curve_brainpoolP512r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_curve_brainpoolP512r1 1/1 Test: DPP QR Code and curve brainpoolP512r1 dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_curve_brainpoolP512r1 0.132724 2022-07-04 13:05:38.875260 passed all 1 test case(s) 2022-07-04 13:05:38 ./run-tests.py eap_proto_pax DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_pax 1/1 Test: EAP-PAX protocol tests Starting AP wlan3 Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 020a00090175736572 Test: Missing payload Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 022900090175736572 Test: Minimum length payload Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 024800090175736572 Test: Unsupported MAC ID Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 02c600090175736572 Test: Unsupported DH Group ID Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 022c00090175736572 Test: Unsupported Public Key ID Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 02f700090175736572 Test: More fragments Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 026100090175736572 Test: Invalid ICV Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 028500090175736572 Test: Invalid ICV in short frame Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 02b700090175736572 Test: Correct ICV - unsupported op_code Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 02ec00090175736572 Test: Correct ICV - CE flag in STD-1 Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 020f00090175736572 Test: Correct ICV - too short STD-1 payload Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 028c00090175736572 Test: Correct ICV - incorrect A length in STD-1 Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 022b00090175736572 Test: Correct ICV - extra data in STD-1 pax_handler - RX 020a00542e02000100000020d4ea66ee33c331b97260e2112ed87989f85199892b4f2668da9d39fe589cd7f90004757365720010d5950ee90b8f0af8cb87b5cb1e4b5d726f171c61a6ca804da8f067a9f36a4b03 Test: Unexpected STD-1 Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 029a00090175736572 Test: STD-1 pax_handler - RX 020a00542e02000100000020fc77f388571d85add5eb319437e7effa1efd850e38d65f711507d06ae4b2d8690004757365720010b3a6428139979f8dc6fa8d093ae90360b0d270f060af42265755716d74778337 Test: MAC ID changed during session Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 027a00090175736572 Test: STD-1 pax_handler - RX 020a00542e02000100000020a25d2a2d8610033dd8ee498ec9ebae435044225449bb013dd42aba3e38da900e000475736572001084927801ff62e603d4a072438eb6492daec28d2bee89bb9d9739c7c731ac7331 Test: DH Group ID changed during session Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 02e100090175736572 Test: STD-1 pax_handler - RX 020a00542e02000100000020ef7fdd945a0d04c1df22ef14d128a027a9f83b826fc0c9c5e2a9bbf85869c5ad0004757365720010eea567a8643158b44eb4396c88f5034cda565d60e1229289a25e92b6e73c749a Test: Public Key ID changed during session Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 023c00090175736572 Test: Unexpected STD-3 Connect STA wlan0 to AP Waiting for EAP method to start pax_handler - RX 020500090175736572 Test: STD-1 pax_handler - RX 020a00542e020001000000209d9cc95c46ecc61a06dec401123aa58d99215d4cd5f0571414b8a3183f95a3ca000475736572001028009b13d547dea519a10f6d8a16f7f7645b1ba120d579a8328e0915d3b0260d Test: STD-3 with CE flag Too short password Connect STA wlan0 to AP pax_handler - RX 028e00090175736572 Test: Default request pax_handler - RX 020c00060300 Test: Default EAP-Failure No password Connect STA wlan0 to AP pax_handler - RX 026200090175736572 Test: Default request pax_handler - RX 020e00060300 Test: Default EAP-Failure PASS eap_proto_pax 2.037486 2022-07-04 13:05:41.308015 passed all 1 test case(s) 2022-07-04 13:05:41 ./run-tests.py eap_proto_pwd_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_pwd_errors 1/1 Test: EAP-pwd local error cases Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_pwd_errors 5.707562 2022-07-04 13:05:47.414057 passed all 1 test case(s) 2022-07-04 13:05:47 ./run-tests.py eap_proto_pwd_invalid_element DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_pwd_invalid_element 1/1 Test: EAP-pwd protocol tests - invalid server element Starting AP wlan3 Connect STA wlan0 to AP pwd_handler - RX 0264000d017077642075736572 Test: Valid id exchange pwd_handler - RX 0202001734010013010100000000007077642075736572 Test: Commit payload with invalid element Starting AP wlan3 Connect STA wlan0 to AP pwd_handler - RX 02bb000d017077642075736572 Test: Valid id exchange pwd_handler - RX 0202001734010013010100000000007077642075736572 Test: Commit payload with invalid element Starting AP wlan3 Connect STA wlan0 to AP pwd_handler - RX 02a2000d017077642075736572 Test: Valid id exchange pwd_handler - RX 0202001734010013010100000000007077642075736572 Test: Commit payload with invalid element Starting AP wlan3 Connect STA wlan0 to AP pwd_handler - RX 02cd000d017077642075736572 Test: Valid id exchange pwd_handler - RX 0202001734010013010100000000007077642075736572 Test: Commit payload with invalid element Starting AP wlan3 Connect STA wlan0 to AP pwd_handler - RX 028a000d017077642075736572 Test: Valid id exchange pwd_handler - RX 0202001734010013010100000000007077642075736572 Test: Commit payload with invalid element Starting AP wlan3 Connect STA wlan0 to AP pwd_handler - RX 0257000d017077642075736572 Test: Valid id exchange pwd_handler - RX 0202001734010013010100000000007077642075736572 Test: Commit payload with invalid element Starting AP wlan3 Connect STA wlan0 to AP pwd_handler - RX 02df000d017077642075736572 Test: Valid id exchange pwd_handler - RX 0202001734010013010100000000007077642075736572 Test: Commit payload with invalid element PASS eap_proto_pwd_invalid_element 2.021285 2022-07-04 13:05:49.832452 passed all 1 test case(s) 2022-07-04 13:05:49 ./run-tests.py eap_ttls_no_session_resumption DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_ttls_no_session_resumption 1/1 Test: EAP-TTLS session resumption disabled on server Starting AP wlan3 Connect STA wlan0 to AP PASS eap_ttls_no_session_resumption 0.306948 2022-07-04 13:05:50.541968 passed all 1 test case(s) 2022-07-04 13:05:50 ./run-tests.py fils_sk_pfs_25 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_pfs_25 1/1 Test: FILS SK with PFS (DH group 25) Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_sk_pfs_25 0.350857 2022-07-04 13:05:51.292263 passed all 1 test case(s) 2022-07-04 13:05:51 ./run-tests.py fils_sk_pfs_pmksa_caching DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_pfs_pmksa_caching 1/1 Test: FILS SK with PFS and PMKSA caching Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_sk_pfs_pmksa_caching 0.687573 2022-07-04 13:05:52.378354 passed all 1 test case(s) 2022-07-04 13:05:52 ./run-tests.py fils_sk_pmksa_caching_and_cache_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_pmksa_caching_and_cache_id 1/1 Test: FILS SK and PMKSA caching with Cache Identifier Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP Starting AP wlan4 (old add_ap argument type) PASS fils_sk_pmksa_caching_and_cache_id 0.444428 2022-07-04 13:05:53.222122 passed all 1 test case(s) 2022-07-04 13:05:53 ./run-tests.py fst_ap_initiate_session_response_with_reject DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_initiate_session_response_with_reject 1/1 Test: FST AP initiate session - response with reject Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Response with reject) PASS fst_ap_initiate_session_response_with_reject 0.492109 2022-07-04 13:05:54.111100 passed all 1 test case(s) 2022-07-04 13:05:54 ./run-tests.py fst_many_setup DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_many_setup 1/1 Test: FST setup multiple times Starting AP wlan3 Starting AP wlan4 Connect STA wlan5 to AP Connect STA wlan6 to AP PASS fst_many_setup 0.984226 2022-07-04 13:05:55.493458 passed all 1 test case(s) 2022-07-04 13:05:55 ./run-tests.py fst_sta_tear_down_session_bad_fsts_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_tear_down_session_bad_fsts_id 1/1 Test: FST STA tear down session - bad fsts id Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Bad fsts_id) PASS fst_sta_tear_down_session_bad_fsts_id 5.480497 2022-07-04 13:06:01.379424 passed all 1 test case(s) 2022-07-04 13:06:01 ./run-tests.py gas_max_pending DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_max_pending 1/1 Test: GAS and maximum pending query limit Starting AP wlan3 PASS gas_max_pending 0.210456 2022-07-04 13:06:01.989559 passed all 1 test case(s) 2022-07-04 13:06:02 ./run-tests.py go_neg_peers_force_diff_freq DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START go_neg_peers_force_diff_freq 1/1 Test: P2P channel selection when peers for different frequency Start GO negotiation wlan0 -> wlan1 wlan0: Trying to discover peer 02:00:00:00:01:00 go_neg_init_pbc thread caught an exception from p2p_go_neg_init: P2P_CONNECT failed PASS go_neg_peers_force_diff_freq 15.120152 2022-07-04 13:06:17.505795 passed all 1 test case(s) 2022-07-04 13:06:17 ./run-tests.py grpform DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform 1/1 Test: P2P group formation using PIN and authorized connection (init -> GO) Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS grpform 2.869664 2022-07-04 13:06:20.775167 passed all 1 test case(s) 2022-07-04 13:06:20 ./run-tests.py hapd_ctrl_attach_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_attach_errors 1/1 Test: hostapd ATTACH errors Starting AP wlan3 PASS hapd_ctrl_attach_errors 0.139561 2022-07-04 13:06:21.315272 passed all 1 test case(s) 2022-07-04 13:06:21 ./run-tests.py ieee8021x_eapol_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_eapol_key 1/1 Test: IEEE 802.1X connection and EAPOL-Key protocol tests Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_eapol_key 0.27172 2022-07-04 13:06:21.986946 passed all 1 test case(s) 2022-07-04 13:06:22 ./run-tests.py ieee8021x_wep40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ieee8021x_wep40 1/1 Test: IEEE 802.1X connection using dynamic WEP40 Starting AP wlan3 Connect STA wlan0 to AP PASS ieee8021x_wep40 0.254976 2022-07-04 13:06:22.639964 passed all 1 test case(s) 2022-07-04 13:06:22 ./run-tests.py macsec_hostapd_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_hostapd_psk 1/1 Test: MACsec PSK with hostapd ip link: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: mtu 1500 qdisc fq_codel state DOWN mode DEFAULT group default qlen 1000 link/ether 00:22:4d:81:6e:ce brd ff:ff:ff:ff:ff:ff altname eno1 altname enp0s25 3: eth1: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether b4:96:91:2e:ca:0c brd ff:ff:ff:ff:ff:ff altname enp1s0f0 4: eth2: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether b4:96:91:2e:ca:0d brd ff:ff:ff:ff:ff:ff altname enp1s0f1 5: eth3: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether b4:96:91:2e:ca:0e brd ff:ff:ff:ff:ff:ff altname enp1s0f2 6: eth4: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000 link/ether b4:96:91:2e:ca:0f brd ff:ff:ff:ff:ff:ff altname enp1s0f3 7: wlan0: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 8: wlan1: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff 9: wlan2: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff 10: wlan3: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff 11: wlan4: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff 12: wlan5: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff 13: wlan6: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff 14: hwsim0: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_hostapd_psk 0.256029 2022-07-04 13:06:23.297594 passed all 0 test case(s) skipped 1 test case(s) 2022-07-04 13:06:23 ./run-tests.py mbo_anqp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_anqp 1/1 Test: MBO ANQP Starting AP wlan3 PASS mbo_anqp 0.168382 2022-07-04 13:06:23.885406 passed all 1 test case(s) 2022-07-04 13:06:23 ./run-tests.py mesh_cnf_rcvd_event_cls_acpt DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_cnf_rcvd_event_cls_acpt 1/1 Test: Mesh peering management protocol testing - CLS_ACPT event in CNF_RCVD PASS mesh_cnf_rcvd_event_cls_acpt 0.782777 2022-07-04 13:06:25.066863 passed all 1 test case(s) 2022-07-04 13:06:25 ./run-tests.py mesh_secure_ccmp_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_ccmp_256 1/1 Test: Secure mesh with CCMP-256 PASS mesh_secure_ccmp_256 0.712331 2022-07-04 13:06:26.177933 passed all 1 test case(s) 2022-07-04 13:06:26 ./run-tests.py multi_ap_disabled_on_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_disabled_on_ap 1/1 Test: Multi-AP association attempt when disabled on AP Starting AP wlan3 Connect STA wlan0 to AP PASS multi_ap_disabled_on_ap 0.206761 2022-07-04 13:06:26.786235 passed all 1 test case(s) 2022-07-04 13:06:26 ./run-tests.py nfc_wps_password_token_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START nfc_wps_password_token_ap 1/1 Test: WPS registrar configuring an AP using AP password token Starting AP wlan3 WPS configuration step PASS nfc_wps_password_token_ap 4.072261 2022-07-04 13:06:31.258101 passed all 1 test case(s) 2022-07-04 13:06:31 ./run-tests.py obss_coex_report_handling1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START obss_coex_report_handling1 1/1 Test: Overlapping BSS scan report handling with obss_interval=1 Starting AP wlan3 Connect STA wlan0 to AP PASS obss_coex_report_handling1 6.61595 2022-07-04 13:06:38.275704 passed all 1 test case(s) 2022-07-04 13:06:38 ./run-tests.py openssl_ecdh_curves DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START openssl_ecdh_curves 1/1 Test: OpenSSL ECDH curve configuration Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS openssl_ecdh_curves 0.650525 2022-07-04 13:06:39.325659 passed all 1 test case(s) 2022-07-04 13:06:39 ./run-tests.py p2p_channel_vht80p80_autogo DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_channel_vht80p80_autogo 1/1 Test: P2P autonomous GO and VHT 80+80 MHz channel PASS p2p_channel_vht80p80_autogo 0.960127 2022-07-04 13:06:40.684295 passed all 1 test case(s) 2022-07-04 13:06:40 ./run-tests.py p2p_device_grpform_timeout_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_device_grpform_timeout_go 1/1 Test: P2P group formation timeout on GO with cfg80211 P2P Device wlan0: Trying to discover peer 42:00:00:00:07:00 wlan7: Trying to discover peer 02:00:00:00:00:00 Remaining interfaces: p2p-dev-wlan7 wlan7 PASS p2p_device_grpform_timeout_go 10.988257 2022-07-04 13:06:52.072896 passed all 1 test case(s) 2022-07-04 13:06:52 ./run-tests.py p2p_device_incorrect_command_interface2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_device_incorrect_command_interface2 1/1 Test: cfg80211 P2P Device and P2P_GROUP_ADD command on incorrect interface Group results: {'result': 'success', 'ifname': 'p2p-wlan7-0', 'role': 'GO', 'ssid': 'DIRECT-FI', 'freq': '2412', 'persistent': False, 'passphrase': 'XWYxP5vU', 'go_dev_addr': '42:00:00:00:08:00'} PASS p2p_device_incorrect_command_interface2 0.335466 2022-07-04 13:06:52.806451 passed all 1 test case(s) 2022-07-04 13:06:52 ./run-tests.py p2p_msg_empty DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_msg_empty 1/1 Test: P2P protocol test: empty P2P Public Action frame Starting AP wlan3 PASS p2p_msg_empty 0.324656 2022-07-04 13:06:53.532702 passed all 1 test case(s) 2022-07-04 13:06:53 ./run-tests.py p2p_service_discovery_external DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_service_discovery_external 1/1 Test: P2P service discovery using external response wlan1: Trying to discover peer 02:00:00:00:00:00 wlan1: Trying to discover peer 02:00:00:00:00:00 PASS p2p_service_discovery_external 0.618084 2022-07-04 13:06:54.548998 passed all 1 test case(s) 2022-07-04 13:06:54 ./run-tests.py p2p_service_discovery_fragmentation DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_service_discovery_fragmentation 1/1 Test: P2P service discovery with fragmentation wlan1: Trying to discover peer 02:00:00:00:00:00 wlan1: Trying to discover peer 02:00:00:00:00:00 PASS p2p_service_discovery_fragmentation 2.152764 2022-07-04 13:06:57.103335 passed all 1 test case(s) 2022-07-04 13:06:57 ./run-tests.py p2ps_connect_p2ps_method_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_connect_p2ps_method_2 1/1 Test: P2PS connection with P2PS method - group interface on dev0 PASS p2ps_connect_p2ps_method_2 0.889449 2022-07-04 13:06:58.390472 passed all 1 test case(s) 2022-07-04 13:06:58 ./run-tests.py p2ps_go_probe DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_go_probe 1/1 Test: P2PS GO discoverability on operating channel PASS p2ps_go_probe 0.814755 2022-07-04 13:06:59.604131 passed all 1 test case(s) 2022-07-04 13:06:59 ./run-tests.py radius_failover DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_failover 1/1 Test: RADIUS Authentication and Accounting server failover Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS radius_failover 21.369254 2022-07-04 13:07:21.373782 passed all 1 test case(s) 2022-07-04 13:07:21 ./run-tests.py radius_psk_invalid2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_psk_invalid2 1/1 Test: WPA2 with invalid PSK (hexstring) from RADIUS Starting AP wlan3 Connect STA wlan0 to AP Received authentication request PASS radius_psk_invalid2 1.221022 2022-07-04 13:07:23.000854 passed all 1 test case(s) 2022-07-04 13:07:23 ./run-tests.py rrm_beacon_req_active_no_ir DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_active_no_ir 1/1 Test: Beacon request - active scan mode and NO_IR channel Starting AP wlan3 Connect STA wlan0 to AP Beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=d480b46afae2050064000114000372726d010882848b960c1218240301012a010432043048606c460570000000003b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00 fragment_id=0100 PASS rrm_beacon_req_active_no_ir 0.374194 2022-07-04 13:07:23.782096 passed all 1 test case(s) 2022-07-04 13:07:23 ./run-tests.py rrm_beacon_req_active_single_channel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_beacon_req_active_single_channel 1/1 Test: Beacon request - active scan mode with single channel Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Received beacon report: opclass=81 channel=1 start=0 duration=100 frame_info=7 rcpi=160 rsni=255 bssid=02:00:00:00:03:00 antenna_id=0 parent_tsf=0 frame_body=da00c16afae2050064000114000372726d010882848b960c1218240301012a010432043048606c460570000000003b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00 fragment_id=0100 PASS rrm_beacon_req_active_single_channel 0.319342 2022-07-04 13:07:24.517516 passed all 1 test case(s) 2022-07-04 13:07:24 ./run-tests.py rrm_lci_req_ap_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_lci_req_ap_oom 1/1 Test: LCI report generation AP OOM and failure Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_lci_req_ap_oom 0.231898 2022-07-04 13:07:25.188405 passed all 1 test case(s) 2022-07-04 13:07:25 ./run-tests.py rrm_lci_req_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START rrm_lci_req_oom 1/1 Test: LCI report generation OOM Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS rrm_lci_req_oom 0.213088 2022-07-04 13:07:25.813537 passed all 1 test case(s) 2022-07-04 13:07:25 ./run-tests.py sae_commit_override DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_commit_override 1/1 Test: SAE commit override (hostapd) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_commit_override 1.181424 2022-07-04 13:07:27.402095 passed all 1 test case(s) 2022-07-04 13:07:27 ./run-tests.py sae_confirm_immediate2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_confirm_immediate2 1/1 Test: SAE and AP sending Confirm message without waiting STA (2) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_confirm_immediate2 0.265432 2022-07-04 13:07:28.073084 passed all 1 test case(s) 2022-07-04 13:07:28 ./run-tests.py sae_h2e_rsnxe_mismatch_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_h2e_rsnxe_mismatch_ap 1/1 Test: SAE H2E and RSNXE mismatch in EAPOL-Key msg 3/4 Starting AP wlan3 Connect STA wlan0 to AP PASS sae_h2e_rsnxe_mismatch_ap 0.257355 2022-07-04 13:07:28.735066 passed all 1 test case(s) 2022-07-04 13:07:28 ./run-tests.py sae_pk_group_20_sae_group_21 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_group_20_sae_group_21 1/1 Test: SAE-PK with group 20 with SAE group 21 Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pk_group_20_sae_group_21 0.33842 2022-07-04 13:07:29.479087 passed all 1 test case(s) 2022-07-04 13:07:29 ./run-tests.py sigma_dut_ap_eap_osen DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_eap_osen 1/1 Test: sigma_dut controlled AP with EAP+OSEN Skip test case: sigma_dut not available SKIP sigma_dut_ap_eap_osen 0.146194 2022-07-04 13:07:30.028481 passed all 0 test case(s) skipped 1 test case(s) 2022-07-04 13:07:30 ./run-tests.py sigma_dut_ap_owe_transition_mode_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_owe_transition_mode_2 1/1 Test: sigma_dut controlled AP with OWE and transition mode (2) Skip test case: sigma_dut not available SKIP sigma_dut_ap_owe_transition_mode_2 0.151675 2022-07-04 13:07:30.584981 passed all 0 test case(s) skipped 1 test case(s) 2022-07-04 13:07:30 ./run-tests.py sigma_dut_dpp_self_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_self_config 1/1 Test: sigma_dut DPP Configurator enrolling an AP and using self-configuration Starting AP wlan3 Skip test case: sigma_dut not available SKIP sigma_dut_dpp_self_config 0.138318 2022-07-04 13:07:31.129282 passed all 0 test case(s) skipped 1 test case(s) 2022-07-04 13:07:31 ./run-tests.py sigma_dut_dpp_tcp_conf_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_tcp_conf_resp 1/1 Test: sigma_dut DPP TCP Configurator (Controller) as responder Skip test case: sigma_dut not available SKIP sigma_dut_dpp_tcp_conf_resp 0.108907 2022-07-04 13:07:31.645236 passed all 0 test case(s) skipped 1 test case(s) 2022-07-04 13:07:31 ./run-tests.py sigma_dut_ocv DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ocv 1/1 Test: sigma_dut controlled STA using OCV Skip test case: sigma_dut not available SKIP sigma_dut_ocv 0.10921 2022-07-04 13:07:32.161327 passed all 0 test case(s) skipped 1 test case(s) 2022-07-04 13:07:32 ./run-tests.py wep_he DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wep_he 1/1 Test: WEP and HE Starting AP wlan3 Connect STA wlan0 to AP hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy3', 'freq': '2412', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '0', 'num_sta_no_short_preamble': '0', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '1', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x13', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '1', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '0', 'ieee80211n': '0', 'ieee80211ac': '0', 'ieee80211ax': '0', 'ieee80211be': '0', 'beacon_int': '100', 'dtim_period': '2', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'max_txpower': '20', 'bss[0]': 'wlan3', 'bssid[0]': '02:00:00:00:03:00', 'ssid[0]': 'test-he-wep', 'num_sta[0]': '1'} PASS wep_he 0.348458 2022-07-04 13:07:32.913926 passed all 1 test case(s) 2022-07-04 13:07:32 ./run-tests.py wnm_bss_transition_mgmt_query_with_unknown_candidates DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_transition_mgmt_query_with_unknown_candidates 1/1 Test: WNM BSS Transition Management query with unknown candidates Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_bss_transition_mgmt_query_with_unknown_candidates 0.222805 2022-07-04 13:07:33.563351 passed all 1 test case(s) 2022-07-04 13:07:33 ./run-tests.py wnm_sleep_mode_rsn_pmf_key_workaround DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_sleep_mode_rsn_pmf_key_workaround 1/1 Test: WNM Sleep Mode - RSN with PMF and GTK/IGTK workaround Starting AP wlan3 Connect STA wlan0 to AP Going to WNM Sleep Mode Waking up from WNM Sleep Mode PASS wnm_sleep_mode_rsn_pmf_key_workaround 0.538026 2022-07-04 13:07:34.532445 passed all 1 test case(s) 2022-07-04 13:07:34 ./run-tests.py wpas_ctrl_enable_disable_network DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_enable_disable_network 1/1 Test: wpa_supplicant ctrl_iface ENABLE/DISABLE_NETWORK Starting AP wlan3 Connect STA wlan0 to AP PASS wpas_ctrl_enable_disable_network 0.373833 2022-07-04 13:07:35.329681 passed all 1 test case(s) 2022-07-04 13:07:35 ./run-tests.py wpas_ctrl_pno DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_pno 1/1 Test: wpa_supplicant ctrl_iface pno PASS wpas_ctrl_pno 0.126266 2022-07-04 13:07:35.871252 passed all 1 test case(s) 2022-07-04 13:07:35 ./run-tests.py wpas_ctrl_preauth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_preauth 1/1 Test: wpa_supplicant ctrl_iface preauth PASS wpas_ctrl_preauth 0.141637 2022-07-04 13:07:36.457300 passed all 1 test case(s) 2022-07-04 13:07:36 ./run-tests.py wpas_ctrl_set_tdls_trigger_control DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_set_tdls_trigger_control 1/1 Test: wpa_supplicant SET tdls_trigger_control PASS wpas_ctrl_set_tdls_trigger_control 0.116154 2022-07-04 13:07:36.994569 passed all 1 test case(s) 2022-07-04 13:07:37 ./run-tests.py wps_ext_cred_proto_auth_type_missing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_cred_proto_auth_type_missing 1/1 Test: WPS and Credential: Auth Type missing Starting AP wlan3 PASS wps_ext_cred_proto_auth_type_missing 0.30665 2022-07-04 13:07:37.722480 passed all 1 test case(s) 2022-07-04 13:07:37 ./stop.sh