2022-07-26 17:58:29 export USER=root 2022-07-26 17:58:29 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client osu_client.c: In function ‘cmd_osu_select’: osu_client.c:2090:44: warning: ‘%s’ directive output may be truncated writing up to 985 bytes into a region of size 4 [-Wformat-truncation=] 2090 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 14); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~ osu_client.c:2090:4: note: ‘snprintf’ output between 1 and 986 bytes into a destination of size 4 2090 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 14); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2103:44: warning: ‘%s’ directive output may be truncated writing up to 994 bytes into a region of size 4 [-Wformat-truncation=] 2103 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 5); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~ osu_client.c:2103:4: note: ‘snprintf’ output between 1 and 995 bytes into a destination of size 4 2103 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 5); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2077:10: warning: ‘%s’ directive output may be truncated writing up to 990 bytes into a region of size 256 [-Wformat-truncation=] 2077 | "%s", buf + 9); | ^~ In file included from ../../src/utils/common.h:12, from osu_client.c:16: ../../src/utils/os.h:552:21: note: ‘snprintf’ output between 1 and 991 bytes into a destination of size 256 552 | #define os_snprintf snprintf osu_client.c:2076:4: note: in expansion of macro ‘os_snprintf’ 2076 | os_snprintf(last->osu_nai2, sizeof(last->osu_nai2), | ^~~~~~~~~~~ osu_client.c:2071:10: warning: ‘%s’ directive output may be truncated writing up to 991 bytes into a region of size 256 [-Wformat-truncation=] 2071 | "%s", buf + 8); | ^~ In file included from ../../src/utils/common.h:12, from osu_client.c:16: ../../src/utils/os.h:552:21: note: ‘snprintf’ output between 1 and 992 bytes into a destination of size 256 552 | #define os_snprintf snprintf osu_client.c:2070:4: note: in expansion of macro ‘os_snprintf’ 2070 | os_snprintf(last->osu_nai, sizeof(last->osu_nai), | ^~~~~~~~~~~ osu_client.c:2065:7: warning: ‘%s’ directive output may be truncated writing up to 989 bytes into a region of size 33 [-Wformat-truncation=] 2064 | snprintf(last->osu_ssid2, sizeof(last->osu_ssid2), | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2065 | "%s", buf + 10); | ~^~~~~~~~~~~~~~ osu_client.c:2064:4: note: ‘snprintf’ output between 1 and 990 bytes into a destination of size 33 2064 | snprintf(last->osu_ssid2, sizeof(last->osu_ssid2), | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2065 | "%s", buf + 10); | ~~~~~~~~~~~~~~~ osu_client.c:2059:7: warning: ‘%s’ directive output may be truncated writing up to 990 bytes into a region of size 33 [-Wformat-truncation=] 2058 | snprintf(last->osu_ssid, sizeof(last->osu_ssid), | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2059 | "%s", buf + 9); | ~^~~~~~~~~~~~~ osu_client.c:2058:4: note: ‘snprintf’ output between 1 and 991 bytes into a destination of size 33 2058 | snprintf(last->osu_ssid, sizeof(last->osu_ssid), | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2059 | "%s", buf + 9); | ~~~~~~~~~~~~~~ osu_client.c:2048:44: warning: ‘%s’ directive output may be truncated writing up to 995 bytes into a region of size 256 [-Wformat-truncation=] 2048 | snprintf(last->url, sizeof(last->url), "%s", buf + 4); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~ osu_client.c:2048:4: note: ‘snprintf’ output between 1 and 996 bytes into a destination of size 256 2048 | snprintf(last->url, sizeof(last->url), "%s", buf + 4); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2040:48: warning: ‘%s’ directive output may be truncated writing up to 986 bytes into a region of size 20 [-Wformat-truncation=] 2040 | snprintf(last->bssid, sizeof(last->bssid), "%s", | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~ 2041 | buf + 13); | ~~~~~~~~~ osu_client.c:2040:4: note: ‘snprintf’ output between 1 and 987 bytes into a destination of size 20 2040 | snprintf(last->bssid, sizeof(last->bssid), "%s", | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2041 | buf + 13); | ~~~~~~~~~ Building hostapd Building wpa_supplicant 2022-07-26 17:59:20 ./start.sh 2022-07-26 17:59:21 ./run-tests.py ap_bss_add_out_of_memory DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_bss_add_out_of_memory 1/1 Test: Running out of memory while adding a BSS Starting AP wlan4 Starting BSS phy=phy3 ifname=wlan3 Starting BSS phy=phy3 ifname=wlan3-2 Removing BSS wlan3-2 Removing BSS wlan3 PASS ap_bss_add_out_of_memory 1.794536 2022-07-26 17:59:24.416781 passed all 1 test case(s) 2022-07-26 17:59:24 ./run-tests.py ap_cipher_bip_gmac_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_bip_gmac_256 1/1 Test: WPA2-PSK with BIP-GMAC-256 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_cipher_bip_gmac_256 1.351271 2022-07-26 17:59:26.243516 passed all 1 test case(s) 2022-07-26 17:59:26 ./run-tests.py ap_enable_disable_reenable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_enable_disable_reenable 1/1 Test: Enable, disable, re-enable AP Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_enable_disable_reenable 2.539858 2022-07-26 17:59:29.248600 passed all 1 test case(s) 2022-07-26 17:59:29 ./run-tests.py ap_fragmentation_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_fragmentation_open 1/1 Test: Open AP with fragmentation threshold Starting AP wlan3 Connect STA wlan0 to AP PASS ap_fragmentation_open 1.618966 2022-07-26 17:59:31.312448 passed all 1 test case(s) 2022-07-26 17:59:31 ./run-tests.py ap_ft_pmf_beacon_prot DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_pmf_beacon_prot 1/1 Test: WPA2-PSK-FT AP with PMF and beacon protection Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_pmf_beacon_prot 3.122905 2022-07-26 17:59:34.878480 passed all 1 test case(s) 2022-07-26 17:59:34 ./run-tests.py ap_ft_ptk_rekey DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_ptk_rekey 1/1 Test: WPA2-PSK-FT PTK rekeying triggered by station after roam Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP No event received after roam Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 2891, in test_ap_ft_ptk_rekey check_ptk_rekey(dev[0], hapd0, hapd1) File "/lkp/benchmarks/hwsim/tests/hwsim/test_ap_ft.py", line 2874, in check_ptk_rekey raise Exception("No event received after roam") Exception: No event received after roam FAIL ap_ft_ptk_rekey 7.83503 2022-07-26 17:59:43.156542 passed 0 test case(s) skipped 0 test case(s) failed tests: ap_ft_ptk_rekey 2022-07-26 17:59:43 ./run-tests.py ap_ft_sae_h2e_and_loop DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_sae_h2e_and_loop 1/1 Test: WPA2-PSK-FT-SAE AP (AP H2E, STA loop) Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_sae_h2e_and_loop 2.80651 2022-07-26 17:59:46.411111 passed all 1 test case(s) 2022-07-26 17:59:46 ./run-tests.py ap_hs20_anqp_format_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_anqp_format_errors 1/1 Test: Interworking network selection and ANQP format errors Starting AP wlan3 PASS ap_hs20_anqp_format_errors 3.123873 2022-07-26 17:59:49.979152 passed all 1 test case(s) 2022-07-26 17:59:50 ./run-tests.py ap_hs20_auto_interworking_global_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_auto_interworking_global_pmf 1/1 Test: Hotspot 2.0 connection with auto_interworking=1 and pmf=2 Starting AP wlan3 PASS ap_hs20_auto_interworking_global_pmf 5.440866 2022-07-26 17:59:55.865459 passed all 1 test case(s) 2022-07-26 17:59:55 ./run-tests.py ap_hs20_deauth_req_from_radius DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_deauth_req_from_radius 1/1 Test: Hotspot 2.0 connection and deauthentication request from RADIUS Starting AP wlan3 PASS ap_hs20_deauth_req_from_radius 3.291187 2022-07-26 17:59:59.600543 passed all 1 test case(s) 2022-07-26 17:59:59 ./run-tests.py ap_hs20_domain_suffix_match_full DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_domain_suffix_match_full 1/1 Test: Hotspot 2.0 and domain_suffix_match Starting AP wlan3 PASS ap_hs20_domain_suffix_match_full 1.830295 2022-07-26 18:00:01.872582 passed all 1 test case(s) 2022-07-26 18:00:01 ./run-tests.py ap_hs20_eap_fast_gtc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_eap_fast_gtc 1/1 Test: Hotspot 2.0 connection with FAST/EAP-GTC Starting AP wlan3 PASS ap_hs20_eap_fast_gtc 1.447551 2022-07-26 18:00:03.765377 passed all 1 test case(s) 2022-07-26 18:00:03 ./run-tests.py ap_hs20_gas_while_associated DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_gas_while_associated 1/1 Test: Hotspot 2.0 connection with GAS query while associated Starting AP wlan3 Verifying GAS query while associated PASS ap_hs20_gas_while_associated 1.295306 2022-07-26 18:00:05.504714 passed all 1 test case(s) 2022-07-26 18:00:05 ./run-tests.py ap_ht40_plus_minus2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_plus_minus2 1/1 Test: HT40 with both plus and minus allowed (2) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht40_plus_minus2 2.885143 2022-07-26 18:00:08.834831 passed all 1 test case(s) 2022-07-26 18:00:08 ./run-tests.py ap_ht40_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_scan 1/1 Test: HT40 co-ex scan Starting AP wlan3 hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy3', 'freq': '2432', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '0', 'num_sta_no_short_preamble': '0', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '0', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x0', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '5', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '-1', 'ieee80211n': '1', 'ieee80211ac': '0', 'ieee80211ax': '0', 'ieee80211be': '0', 'beacon_int': '100', 'dtim_period': '2', 'ht_caps_info': '000e', 'ht_mcs_bitmask': 'ffff0000000000000000', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'max_txpower': '20', 'bss[0]': 'wlan3', 'bssid[0]': '02:00:00:00:03:00', 'ssid[0]': 'test-ht40', 'num_sta[0]': '0'} Connect STA wlan0 to AP hostapd STA: {'addr': '02:00:00:00:00:00', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][HT]', 'aid': '1', 'capability': '0x421', 'listen_interval': '5', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'timeout_next': 'NULLFUNC POLL', 'rx_packets': '2', 'tx_packets': '2', 'rx_bytes': '128', 'tx_bytes': '169', 'inactive_msec': '111', 'signal': '-30', 'rx_rate_info': '0', 'tx_rate_info': '10', 'ht_mcs_bitmask': 'ffff0000000000000000', 'connected_time': '0', 'supp_op_classes': '5451525354737475767778797a7b7c7d7e7f808182', 'ht_caps_info': '0x107e', 'ext_capab': '04004a8201404040000120'} STA SIGNAL_POLL: RSSI=-30 LINKSPEED=0 NOISE=-92 FREQUENCY=2432 WIDTH=40 MHz CENTER_FRQ1=2422 AVG_RSSI=-30 AVG_BEACON_RSSI=-30 PASS ap_ht40_scan 2.922736 2022-07-26 18:00:12.200484 passed all 1 test case(s) 2022-07-26 18:00:12 ./run-tests.py ap_ht_stbc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht_stbc 1/1 Test: HT STBC overrides Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_ht_stbc 2.243769 2022-07-26 18:00:14.895919 passed all 1 test case(s) 2022-07-26 18:00:14 ./run-tests.py ap_invalid_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_invalid_config 1/1 Test: Try to start AP with invalid configuration and fix configuration Trying to start AP wlan3 with invalid configuration Starting AP wlan3 Fix configuration and start AP again Connect STA wlan0 to AP PASS ap_invalid_config 1.369638 2022-07-26 18:00:16.720967 passed all 1 test case(s) 2022-07-26 18:00:16 ./run-tests.py ap_qosmap_default DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_qosmap_default 1/1 Test: QoS mapping with default values Starting AP wlan3 Connect STA wlan0 to AP PASS ap_qosmap_default 2.115163 2022-07-26 18:00:19.295822 passed all 1 test case(s) 2022-07-26 18:00:19 ./run-tests.py ap_tdls_prohibit DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_tdls_prohibit 1/1 Test: Open AP and TDLS prohibited Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_tdls_prohibit 1.790806 2022-07-26 18:00:21.545869 passed all 1 test case(s) 2022-07-26 18:00:21 ./run-tests.py ap_vht160_no_dfs_100_plus DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht160_no_dfs_100_plus 1/1 Test: VHT with 160 MHz channel width and no DFS (100 plus) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS ap_vht160_no_dfs_100_plus 1.883849 2022-07-26 18:00:23.885136 passed all 1 test case(s) 2022-07-26 18:00:23 ./run-tests.py ap_wpa2_eap_aka_prime_ext DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_aka_prime_ext 1/1 Test: EAP-AKA' with external UMTS auth to hit Synchronization-Failure Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_aka_prime_ext 1.194344 2022-07-26 18:00:25.533893 passed all 1 test case(s) 2022-07-26 18:00:25 ./run-tests.py ap_wpa2_eap_sim_db DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sim_db 1/1 Test: EAP-SIM DB error cases Starting AP wlan3 Connect STA wlan0 to AP No proper response - wait for pending eap_sim_db request timeout PASS ap_wpa2_eap_sim_db 3.076112 2022-07-26 18:00:29.065507 passed all 1 test case(s) 2022-07-26 18:00:29 ./run-tests.py ap_wpa2_eap_tls_ocsp_ca_signed_unknown DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_ocsp_ca_signed_unknown 1/1 Test: EAP-TLS and CA signed OCSP response (unknown) openssl ocsp -reqout logs/current/ocsp-req.der -issuer auth_serv/ca.pem -sha256 -serial 0xD8D3E3A6CBE3CD73 -no_nonce openssl result: openssl ocsp -index auth_serv/index-unknown.txt -rsigner auth_serv/ca.pem -rkey auth_serv/ca-key.pem -CA auth_serv/ca.pem -ndays 7 -reqin logs/current/ocsp-req.der -resp_no_certs -respout logs/current/ocsp-resp-ca-signed-unknown.der openssl result: Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_ocsp_ca_signed_unknown 1.221328 2022-07-26 18:00:30.741496 passed all 1 test case(s) 2022-07-26 18:00:30 ./run-tests.py ap_wpa2_psk_ext_eapol_retry1c DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ext_eapol_retry1c 1/1 Test: WPA2 4-way handshake with EAPOL-Key 1/4 and 2/4 retransmitted and SNonce changing Starting AP wlan3 Connect STA wlan0 to AP Send EAPOL-Key msg 2/4 (a) Send EAPOL-Key msg 2/4 (b) Send EAPOL-Key msg 4/4 PASS ap_wpa2_psk_ext_eapol_retry1c 1.167827 2022-07-26 18:00:32.363481 passed all 1 test case(s) 2022-07-26 18:00:32 ./run-tests.py ap_wpa2_psk_ext_key_id_ptk_rekey_sta2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ext_key_id_ptk_rekey_sta2 1/1 Test: Extended Key ID and PTK rekey by station (start with Key ID 1) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_ext_key_id_ptk_rekey_sta2 2.385964 2022-07-26 18:00:35.204812 passed all 1 test case(s) 2022-07-26 18:00:35 ./run-tests.py ap_wpa2_psk_supp_proto_no_igtk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_supp_proto_no_igtk 1/1 Test: WPA2-PSK supplicant protocol testing: no IGTK KDE Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_supp_proto_no_igtk 1.839012 2022-07-26 18:00:37.496918 passed all 1 test case(s) 2022-07-26 18:00:37 ./run-tests.py ap_wps_conf_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_conf_5ghz 1/1 Test: WPS PBC provisioning with configured AP on 5 GHz band Starting AP wlan3 WPS provisioning step Country code at the end: 00 PASS ap_wps_conf_5ghz 2.118401 2022-07-26 18:00:40.068129 passed all 1 test case(s) 2022-07-26 18:00:40 ./run-tests.py ap_wps_eap_wsc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_eap_wsc 1/1 Test: WPS and EAP-WSC in network profile Starting AP wlan3 Unexpected identity Connect STA wlan0 to AP No phase1 parameter Connect STA wlan0 to AP No PIN/PBC in phase1 Connect STA wlan0 to AP Invalid pkhash in phase1 Connect STA wlan0 to AP Zero fragment_size Connect STA wlan0 to AP Missing new_auth Connect STA wlan0 to AP Missing new_encr Connect STA wlan0 to AP Missing new_key Connect STA wlan0 to AP PASS ap_wps_eap_wsc 4.542611 2022-07-26 18:00:45.061426 passed all 1 test case(s) 2022-07-26 18:00:45 ./run-tests.py ap_wps_er_http_proto_invalid_sid_uuid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto_invalid_sid_uuid 1/1 Test: WPS ER HTTP protocol testing - invalid SID UUID HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" HTTP server received: SUBSCRIBE /wps_event HTTP/1.1 HTTP header: HOST: 127.0.0.1:12345 HTTP header: CALLBACK: HTTP header: NT: upnp:event HTTP header: TIMEOUT: Second-1800 Event URL: http://127.0.0.1:49152/event/52352358/1 PASS ap_wps_er_http_proto_invalid_sid_uuid 0.145191 2022-07-26 18:00:45.649636 passed all 1 test case(s) 2022-07-26 18:00:45 ./run-tests.py ap_wps_m2_missing_msg_type DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_m2_missing_msg_type 1/1 Test: WPS and M2 without Message Type Starting AP wlan3 PASS ap_wps_m2_missing_msg_type 1.495981 2022-07-26 18:00:47.596180 passed all 1 test case(s) 2022-07-26 18:00:47 ./run-tests.py ap_wps_priority DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_priority 1/1 Test: WPS PIN provisioning with configured AP and wps_priority Starting AP wlan3 WPS provisioning step PASS ap_wps_priority 1.983738 2022-07-26 18:00:50.026111 passed all 1 test case(s) 2022-07-26 18:00:50 ./run-tests.py ap_wps_probe_req_ie_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_probe_req_ie_oom 1/1 Test: WPS ProbeReq IE OOM Starting AP wlan3 PASS ap_wps_probe_req_ie_oom 2.138159 2022-07-26 18:00:52.612092 passed all 1 test case(s) 2022-07-26 18:00:52 ./run-tests.py ap_wps_reg_config_and_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_reg_config_and_sae 1/1 Test: WPS registrar configuring an AP using AP PIN and using PSK+SAE Starting AP wlan3 WPS configuration step Connect STA wlan1 to AP PASS ap_wps_reg_config_and_sae 2.563355 2022-07-26 18:00:55.619723 passed all 1 test case(s) 2022-07-26 18:00:55 ./run-tests.py authsrv_errors_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START authsrv_errors_1 1/1 Test: Authentication server errors (1) Starting AP wlan4 PASS authsrv_errors_1 0.334569 2022-07-26 18:00:56.398444 passed all 1 test case(s) 2022-07-26 18:00:56 ./run-tests.py authsrv_unknown_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START authsrv_unknown_client 1/1 Test: Authentication server and unknown user Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS authsrv_unknown_client 1.603031 2022-07-26 18:00:58.450646 passed all 1 test case(s) 2022-07-26 18:00:58 ./run-tests.py autogo_join_auto_go_neg_after_seeing_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_join_auto_go_neg_after_seeing_go 1/1 Test: P2P_CONNECT-auto fallback to GO Neg after seeing GO Start autonomous GO wlan0 wlan0: Trying to discover peer 02:00:00:00:01:00 PASS autogo_join_auto_go_neg_after_seeing_go 7.388348 2022-07-26 18:01:06.285857 passed all 1 test case(s) 2022-07-26 18:01:06 ./run-tests.py autogo_remove_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_remove_iface 1/1 Test: P2P autonomous GO and interface being removed Start autonomous GO wlan5 PASS autogo_remove_iface 2.049879 2022-07-26 18:01:08.778487 passed all 1 test case(s) 2022-07-26 18:01:08 ./run-tests.py dbus_scan_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_scan_oom 1/1 Test: D-Bus scan method and OOM PASS dbus_scan_oom 0.146008 2022-07-26 18:01:09.367817 passed all 1 test case(s) 2022-07-26 18:01:09 ./run-tests.py dbus_wps_pbc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_wps_pbc 1/1 Test: D-Bus WPS/PBC operation and signals Starting AP wlan3 PASS dbus_wps_pbc 6.299644 2022-07-26 18:01:16.109195 passed all 1 test case(s) 2022-07-26 18:01:16 ./run-tests.py dpp_akm_sha512 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_akm_sha512 1/1 Test: DPP AKM (SHA512) Starting AP wlan3 Connect STA wlan0 to AP PASS dpp_akm_sha512 1.44331 2022-07-26 18:01:17.999188 passed all 1 test case(s) 2022-07-26 18:01:18 ./run-tests.py dpp_nfc_errors_hostapd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_nfc_errors_hostapd 1/1 Test: DPP NFC operation failures in hostapd Starting AP wlan3 PASS dpp_nfc_errors_hostapd 0.61944 2022-07-26 18:01:19.066775 passed all 1 test case(s) 2022-07-26 18:01:19 ./run-tests.py dpp_qr_code_auth_initiator_either_3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_auth_initiator_either_3 1/1 Test: DPP QR Code and authentication exchange (Initiator in either role) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_auth_initiator_either_3 2.246802 2022-07-26 18:01:21.758754 passed all 1 test case(s) 2022-07-26 18:01:21 ./run-tests.py dpp_qr_code_auth_responder_configurator_group_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_auth_responder_configurator_group_id 1/1 Test: DPP QR Code and responder as the configurator with group_id) PASS dpp_qr_code_auth_responder_configurator_group_id 2.276007 2022-07-26 18:01:24.483161 passed all 1 test case(s) 2022-07-26 18:01:24 ./run-tests.py dpp_qr_code_chan_list_unicast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_chan_list_unicast 1/1 Test: DPP QR Code and 2.4 GHz channels (unicast) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_chan_list_unicast 0.783929 2022-07-26 18:01:25.711995 passed all 1 test case(s) 2022-07-26 18:01:25 ./run-tests.py dpp_qr_code_listen_continue DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_listen_continue 1/1 Test: DPP QR Code and listen operation needing continuation dev0 displays QR Code Wait for listen to expire and get restarted dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_listen_continue 5.71767 2022-07-26 18:01:31.875142 passed all 1 test case(s) 2022-07-26 18:01:31 ./run-tests.py dpp_tcp_qr_code_config_event_initiator DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_tcp_qr_code_config_event_initiator 1/1 Test: DPP over TCP (Configurator initiates with config event) PASS dpp_tcp_qr_code_config_event_initiator 0.670399 2022-07-26 18:01:32.989107 passed all 1 test case(s) 2022-07-26 18:01:33 ./run-tests.py eap_proto_aka_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_aka_errors 1/1 Test: EAP-AKA protocol tests (error paths) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_aka_errors 9.690022 2022-07-26 18:01:43.124104 passed all 1 test case(s) 2022-07-26 18:01:43 ./run-tests.py eap_proto_tls DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_tls 1/1 Test: EAP-TLS protocol tests Starting AP wlan3 Running connection iteration 1 Connect STA wlan0 to AP tls_handler - RX 026c000d01746c732075736572 Test: Too much payload in TLS/Start: TLS Message Length (0 bytes) smaller than this fragment (1 bytes) Running connection iteration 2 Connect STA wlan0 to AP tls_handler - RX 02a3000d01746c732075736572 Test: Fragmented TLS/Start tls_handler - RX 020300060d00 Test: Too long fragment of TLS/Start: Invalid reassembly state: tls_in_left=2 tls_in_len=0 in_len=0 Running connection iteration 3 Connect STA wlan0 to AP tls_handler - RX 02a5000d01746c732075736572 Test: EAP-Failure Running connection iteration 4 Connect STA wlan0 to AP tls_handler - RX 0213000d01746c732075736572 Test: TLS/Start tls_handler - RX 020600be0d0016030100b3010000af0303b6d6c81edf20a7da6c108fec36a2b530c0e4b9e6892730039b368dd19359482a000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f00ff0100004e000b000403000102000a000c000a001d0017001e001900180016000000170000000d002a0028040305030603080708080809080a080b080408050806040105010601030303010302040205020602 Test: Fragmented TLS message tls_handler - RX 020700060d00 Test: Invalid TLS message: no Flags octet included + workaround tls_handler - RX 020800060d00 Test: Too long fragment of TLS message: more data than TLS message length indicated tls_handler - RX 020900060d00 Test: EAP-Failure Running connection iteration 5 Connect STA wlan0 to AP tls_handler - RX 029c000d01746c732075736572 Test: Fragmented TLS/Start and truncated Message Length field Running connection iteration 6 Connect STA wlan0 to AP tls_handler - RX 024e000d01746c732075736572 Test: TLS/Start tls_handler - RX 020c00c20d0016030100b7010000b30303f91103e610e5c704ba94acb1b9fc8c5f1872feeb748abcaa94331a62ebb14bcf000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f00ff01000052000b000403000102000a000c000a001d0017001e00190018002300000016000000170000000d002a0028040305030603080708080809080a080b080408050806040105010601030303010302040205020602 Test: Fragmented TLS message tls_handler - RX 020d00060d00 Test: Invalid TLS message: no Flags octet included + workaround disabled Running connection iteration 7 Connect STA wlan0 to AP tls_handler - RX 02ac000d01746c732075736572 Test: TLS/Start tls_handler - RX 020f00be0d0016030100b3010000af030352393f23fe5210dc740d5c40657467c64ea2b5e4ec9928ee8834f2a9664f08ba000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f00ff0100004e000b000403000102000a000c000a001d0017001e001900180016000000170000000d002a0028040305030603080708080809080a080b080408050806040105010601030303010302040205020602 Test: Fragmented TLS message (long; first) tls_handler - RX 021000060d00 Test: Fragmented TLS message (long; cont 0) tls_handler - RX 021100060d00 Test: Fragmented TLS message (long; cont 1) tls_handler - RX 021200060d00 Test: Fragmented TLS message (long; cont 2) tls_handler - RX 021300060d00 Test: Fragmented TLS message (long; cont 3) tls_handler - RX 021400060d00 Test: Fragmented TLS message (long; cont 4) tls_handler - RX 021500060d00 Test: Fragmented TLS message (long; cont 5) tls_handler - RX 021600060d00 Test: Fragmented TLS message (long; cont 6) tls_handler - RX 021700060d00 Test: Fragmented TLS message (long; cont 7) tls_handler - RX 021800060d00 Test: Fragmented TLS message (long; cont 8) tls_handler - RX 021900060d00 Test: Fragmented TLS message (long; cont 9) tls_handler - RX 021a00060d00 Test: Fragmented TLS message (long; cont 10) tls_handler - RX 021b00060d00 Test: Fragmented TLS message (long; cont 11) tls_handler - RX 021c00060d00 Test: Fragmented TLS message (long; cont 12) tls_handler - RX 021d00060d00 Test: Fragmented TLS message (long; cont 13) tls_handler - RX 021e00060d00 Test: Fragmented TLS message (long; cont 14) tls_handler - RX 021f00060d00 Test: Fragmented TLS message (long; cont 15) tls_handler - RX 022000060d00 Test: Fragmented TLS message (long; cont 16) tls_handler - RX 022100060d00 Test: Fragmented TLS message (long; cont 17) tls_handler - RX 022200060d00 Test: Fragmented TLS message (long; cont 18) tls_handler - RX 022300060d00 Test: Fragmented TLS message (long; cont 19) tls_handler - RX 022400060d00 Test: Fragmented TLS message (long; cont 20) tls_handler - RX 022500060d00 Test: Fragmented TLS message (long; cont 21) tls_handler - RX 022600060d00 Test: Fragmented TLS message (long; cont 22) tls_handler - RX 022700060d00 Test: Fragmented TLS message (long; cont 23) tls_handler - RX 022800060d00 Test: Fragmented TLS message (long; cont 24) tls_handler - RX 022900060d00 Test: Fragmented TLS message (long; cont 25) tls_handler - RX 022a00060d00 Test: Fragmented TLS message (long; cont 26) tls_handler - RX 022b00060d00 Test: Fragmented TLS message (long; cont 27) tls_handler - RX 022c00060d00 Test: Fragmented TLS message (long; cont 28) tls_handler - RX 022d00060d00 Test: Fragmented TLS message (long; cont 29) tls_handler - RX 022e00060d00 Test: Fragmented TLS message (long; cont 30) tls_handler - RX 022f00060d00 Test: Fragmented TLS message (long; cont 31) tls_handler - RX 023000060d00 Test: Fragmented TLS message (long; cont 32) tls_handler - RX 023100060d00 Test: Fragmented TLS message (long; cont 33) tls_handler - RX 023200060d00 Test: Fragmented TLS message (long; cont 34) tls_handler - RX 023300060d00 Test: Fragmented TLS message (long; cont 35) tls_handler - RX 023400060d00 Test: Fragmented TLS message (long; cont 36) tls_handler - RX 023500060d00 Test: Fragmented TLS message (long; cont 37) tls_handler - RX 023600060d00 Test: Fragmented TLS message (long; cont 38) tls_handler - RX 023700060d00 Test: Fragmented TLS message (long; cont 39) tls_handler - RX 023800060d00 Test: Fragmented TLS message (long; cont 40) tls_handler - RX 023900060d00 Test: Fragmented TLS message (long; cont 41) tls_handler - RX 023a00060d00 Test: Fragmented TLS message (long; cont 42) tls_handler - RX 023b00060d00 Test: Fragmented TLS message (long; cont 43) tls_handler - RX 023c00060d00 Test: EAP-Failure Running connection iteration 8 Connect STA wlan0 to AP tls_handler - RX 0287000d01746c732075736572 Test: TLS/Start tls_handler - RX 023e006e0dc0000000b816030100b3010000af03034ccb5f419eb25f4454b41a8663e73a15844b959d63e5a734e7e216f4bd9bc635000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f Test: Non-ACK to more-fragment message tls_handler - RX 023f00060d00 Test: EAP-Failure Running connection iteration 9 Connect STA wlan0 to AP tls_handler - RX 027c000d01746c732075736572 No more test responses available - test case completed PASS eap_proto_tls 5.730493 2022-07-26 18:01:49.302301 passed all 1 test case(s) 2022-07-26 18:01:49 ./run-tests.py eap_teap_basic_password_auth_pac_no_inner_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_basic_password_auth_pac_no_inner_eap 1/1 Test: EAP-TEAP with Basic-Password-Auth and PAC without inner auth Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_basic_password_auth_pac_no_inner_eap 1.672054 2022-07-26 18:01:51.449935 passed all 1 test case(s) 2022-07-26 18:01:51 ./run-tests.py eap_teap_eap_mschapv2_pac_no_inner_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_eap_mschapv2_pac_no_inner_eap 1/1 Test: EAP-TEAP with inner EAP-MSCHAPv2 and PAC without inner EAP Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_eap_mschapv2_pac_no_inner_eap 1.198005 2022-07-26 18:01:53.104656 passed all 1 test case(s) 2022-07-26 18:01:53 ./run-tests.py eap_tls_sha384 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_tls_sha384 1/1 Test: EAP-TLS with SHA384 signature Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS eap_tls_sha384 1.830702 2022-07-26 18:01:55.381203 passed all 1 test case(s) 2022-07-26 18:01:55 ./run-tests.py fils_offload_to_driver DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_offload_to_driver 1/1 Test: FILS offload to driver Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_offload_to_driver 2.27221 2022-07-26 18:01:58.096416 passed all 1 test case(s) 2022-07-26 18:01:58 ./run-tests.py fils_sk_erp_followed_by_pmksa_caching DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_erp_followed_by_pmksa_caching 1/1 Test: FILS SK ERP following by PMKSA caching Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_sk_erp_followed_by_pmksa_caching 2.197529 2022-07-26 18:02:00.743438 passed all 1 test case(s) 2022-07-26 18:02:00 ./run-tests.py fst_ap_ack_request_with_no_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_ack_request_with_no_session 1/1 Test: FST AP ack request with no session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Frame was ignored (Ack request) PASS fst_ap_ack_request_with_no_session 7.811364 2022-07-26 18:02:09.001747 passed all 1 test case(s) 2022-07-26 18:02:09 ./run-tests.py fst_ap_ack_response_with_no_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_ack_response_with_no_session 1/1 Test: FST AP ack response with no session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Frame was ignored (Ack response) PASS fst_ap_ack_response_with_no_session 7.717651 2022-07-26 18:02:17.164947 passed all 1 test case(s) 2022-07-26 18:02:17 ./run-tests.py fst_ap_initiate_session_no_new_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_initiate_session_no_new_iface 1/1 Test: FST AP initiate session - no new iface Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (No new_iface was set) PASS fst_ap_initiate_session_no_new_iface 2.681882 2022-07-26 18:02:20.293542 passed all 1 test case(s) 2022-07-26 18:02:20 ./run-tests.py fst_disconnect_1_of_2_stas_from_non_fst_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_disconnect_1_of_2_stas_from_non_fst_ap 1/1 Test: FST disconnect 1 of 2 STAs from non-FST AP Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Starting AP wlan7 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP PASS fst_disconnect_1_of_2_stas_from_non_fst_ap 7.169435 2022-07-26 18:02:27.913727 passed all 1 test case(s) 2022-07-26 18:02:27 ./run-tests.py fst_setup_mbie_diff DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_setup_mbie_diff 1/1 Test: FST setup and different MBIE in FST Setup Request Starting AP wlan3 Starting AP wlan4 Connect STA wlan5 to AP Connect STA wlan6 to AP PASS fst_setup_mbie_diff 2.869698 2022-07-26 18:02:31.225899 passed all 1 test case(s) 2022-07-26 18:02:31 ./run-tests.py gas_anqp_get_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_get_oom 1/1 Test: GAS/ANQP query OOM Starting AP wlan3 PASS gas_anqp_get_oom 0.730367 2022-07-26 18:02:32.397165 passed all 1 test case(s) 2022-07-26 18:02:32 ./run-tests.py gas_anqp_hs20_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_hs20_proto 1/1 Test: GAS/ANQP and Hotspot 2.0 element protocol testing Starting AP wlan3 PASS gas_anqp_hs20_proto 0.94517 2022-07-26 18:02:33.792803 passed all 1 test case(s) 2022-07-26 18:02:33 ./run-tests.py gas_anqp_oom_hapd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_oom_hapd 1/1 Test: GAS/ANQP query and OOM in hostapd Starting AP wlan3 PASS gas_anqp_oom_hapd 2.887983 2022-07-26 18:02:37.116582 passed all 1 test case(s) 2022-07-26 18:02:37 ./run-tests.py gas_fragment_with_comeback_delay DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_fragment_with_comeback_delay 1/1 Test: GAS fragmentation and comeback delay Starting AP wlan3 PASS gas_fragment_with_comeback_delay 1.23207 2022-07-26 18:02:38.793590 passed all 1 test case(s) 2022-07-26 18:02:38 ./run-tests.py grpform_pbc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_pbc 1/1 Test: P2P group formation using PBC and re-init GO Negotiation Start GO negotiation wlan0 -> wlan1 wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 Group formed PASS grpform_pbc 4.416955 2022-07-26 18:02:43.653559 passed all 1 test case(s) 2022-07-26 18:02:43 ./run-tests.py hapd_ctrl_ext_io_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_ext_io_errors 1/1 Test: hostapd and external I/O errors Starting AP wlan3 PASS hapd_ctrl_ext_io_errors 0.63837 2022-07-26 18:02:44.735979 passed all 1 test case(s) 2022-07-26 18:02:44 ./run-tests.py he_40_fallback_to_20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_40_fallback_to_20 1/1 Test: HE and 40 MHz channel configuration falling back to 20 MHz Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS he_40_fallback_to_20 1.92048 2022-07-26 18:02:47.099734 passed all 1 test case(s) 2022-07-26 18:02:47 ./run-tests.py he_capab_parsing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_capab_parsing 1/1 Test: HE AP and capability parsing Starting AP wlan3 PASS he_capab_parsing 0.830387 2022-07-26 18:02:48.371871 passed all 1 test case(s) 2022-07-26 18:02:48 ./run-tests.py he_tkip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_tkip 1/1 Test: HE and TKIP Starting AP wlan3 Connect STA wlan0 to AP hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy3', 'freq': '5180', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '1', 'num_sta_no_short_preamble': '1', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '1', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x13', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '36', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '0', 'ieee80211n': '0', 'ieee80211ac': '0', 'ieee80211ax': '0', 'ieee80211be': '0', 'beacon_int': '100', 'dtim_period': '2', 'supported_rates': '0c 12 18 24 30 48 60 6c', 'max_txpower': '23', 'bss[0]': 'wlan3', 'bssid[0]': '02:00:00:00:03:00', 'ssid[0]': 'he', 'num_sta[0]': '1'} Country code at the end: 00 PASS he_tkip 2.424965 2022-07-26 18:02:51.238769 passed all 1 test case(s) 2022-07-26 18:02:51 ./run-tests.py ibss_wpa_none DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_wpa_none 1/1 Test: IBSS WPA-None Start IBSS on the first STA wlan0 waiting for IBSS start/join to complete Waiting for real BSSID on the first STA wlan0 waiting for IBSS start/join to complete Join two STAs to the IBSS wlan1 waiting for IBSS start/join to complete STA0 BSSID 42:51:c2:cc:74:7e differs from STA1 BSSID 00:00:00:00:00:00 wlan1 waiting for IBSS start/join to complete wlan2 waiting for IBSS start/join to complete STA0 BSSID 42:51:c2:cc:74:7e differs from STA2 BSSID 00:00:00:00:00:00 wlan2 waiting for IBSS start/join to complete bssid0=42:51:c2:cc:74:7e bssid1=42:51:c2:cc:74:7e bssid2=42:51:c2:cc:74:7e Ignoring known connectivity failure: dev1->dev2 unicast data delivery failed Ignoring known connectivity failure: dev1->dev2 unicast data delivery failed Ignoring known connectivity failure: dev1->dev2 unicast data delivery failed PASS ibss_wpa_none 27.453544 2022-07-26 18:03:19.144661 passed all 1 test case(s) 2022-07-26 18:03:19 ./run-tests.py kernel_bss_leak_deauth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START kernel_bss_leak_deauth 1/1 Test: cfg80211/mac80211 BSS leak on deauthentication Starting AP wlan3 Connect STA wlan0 to AP PASS kernel_bss_leak_deauth 1.10857 2022-07-26 18:03:20.698502 passed all 1 test case(s) 2022-07-26 18:03:20 ./run-tests.py macsec_psk_br3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_br3 1/1 Test: MACsec PSK (bridge; 3 devices) ip link: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000 link/ether 64:00:6a:30:91:ac brd ff:ff:ff:ff:ff:ff altname enp0s31f6 3: wlan0: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 4: wlan1: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff 5: wlan2: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff 6: wlan3: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff 7: wlan4: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff 8: wlan5: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff 9: wlan6: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff 10: hwsim0: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 14: brveth: mtu 1500 qdisc noqueue state UP mode DEFAULT group default qlen 1000 link/ether 92:e5:43:67:9b:c6 brd ff:ff:ff:ff:ff:ff 15: vethbr0@veth0: mtu 1500 qdisc noqueue master brveth state LOWERLAYERDOWN mode DEFAULT group default qlen 1000 link/ether b2:1b:4a:d2:b9:b9 brd ff:ff:ff:ff:ff:ff 16: veth0@vethbr0: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 7e:b6:13:e2:f2:8e brd ff:ff:ff:ff:ff:ff 17: vethbr1@veth1: mtu 1500 qdisc noqueue master brveth state LOWERLAYERDOWN mode DEFAULT group default qlen 1000 link/ether 82:7c:98:eb:59:6b brd ff:ff:ff:ff:ff:ff 18: veth1@vethbr1: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 96:3a:10:bb:8c:45 brd ff:ff:ff:ff:ff:ff 19: vethbr2@veth2: mtu 1500 qdisc noqueue master brveth state LOWERLAYERDOWN mode DEFAULT group default qlen 1000 link/ether 4e:44:a2:0d:29:66 brd ff:ff:ff:ff:ff:ff 20: veth2@vethbr2: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 1a:9b:93:4d:33:64 brd ff:ff:ff:ff:ff:ff Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_br3 0.724497 2022-07-26 18:03:21.866504 passed all 0 test case(s) skipped 1 test case(s) 2022-07-26 18:03:21 ./run-tests.py macsec_psk_mka_life_time DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_mka_life_time 1/1 Test: MACsec PSK - MKA life time Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_mka_life_time 0.260363 2022-07-26 18:03:22.581012 passed all 0 test case(s) skipped 1 test case(s) 2022-07-26 18:03:22 ./run-tests.py mbo_assoc_disallow_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_assoc_disallow_change 1/1 Test: MBO and dynamic association disallowed change with passive scanning Starting AP wlan3 Connect STA wlan0 to AP PASS mbo_assoc_disallow_change 1.527356 2022-07-26 18:03:24.582073 passed all 1 test case(s) 2022-07-26 18:03:24 ./run-tests.py mesh_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_failure 1/1 Test: Mesh and local failures PASS mesh_failure 4.203877 2022-07-26 18:03:29.239485 passed all 1 test case(s) 2022-07-26 18:03:29 ./run-tests.py mesh_open_no_auto2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_open_no_auto2 1/1 Test: Open mesh network connectivity, no_auto on both peers PASS mesh_open_no_auto2 1.657237 2022-07-26 18:03:31.340244 passed all 1 test case(s) 2022-07-26 18:03:31 ./run-tests.py mesh_secure_ocv_mix_ht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_ocv_mix_ht 1/1 Test: Mesh network with a VHT STA and a HT STA under OCV Country code at the end: 00 PASS mesh_secure_ocv_mix_ht 2.615988 2022-07-26 18:03:34.401755 passed all 1 test case(s) 2022-07-26 18:03:34 ./run-tests.py mscs_without_ap_support DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mscs_without_ap_support 1/1 Test: MSCS without AP support Starting AP wlan3 Connect STA wlan0 to AP PASS mscs_without_ap_support 1.225002 2022-07-26 18:03:36.064136 passed all 1 test case(s) 2022-07-26 18:03:36 ./run-tests.py multi_ap_wps_shared DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_wps_shared 1/1 Test: WPS on shared fronthaul/backhaul AP Starting AP wlan3 PASS multi_ap_wps_shared 21.581087 2022-07-26 18:03:58.091192 passed all 1 test case(s) 2022-07-26 18:03:58 ./run-tests.py p2p_channel_5ghz_165_169_us DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_channel_5ghz_165_169_us 1/1 Test: P2P GO and 5 GHz channels 165 (allowed) and 169 (disallowed) in US Country code at the end: 00 PASS p2p_channel_5ghz_165_169_us 1.017306 2022-07-26 18:03:59.552778 passed all 1 test case(s) 2022-07-26 18:03:59 ./run-tests.py p2ps_connect_adv_go_p2ps_method_group_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_connect_adv_go_p2ps_method_group_iface 1/1 Test: P2PS auto-accept connection with advertisement as GO and P2PS method using separate group interface PASS p2ps_connect_adv_go_p2ps_method_group_iface 12.749628 2022-07-26 18:04:12.748811 passed all 1 test case(s) 2022-07-26 18:04:12 ./run-tests.py p2ps_wildcard_p2ps DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_wildcard_p2ps 1/1 Test: P2PS wildcard SD Probe Request/Response PASS p2ps_wildcard_p2ps 3.505238 2022-07-26 18:04:16.701401 passed all 1 test case(s) 2022-07-26 18:04:16 ./run-tests.py pasn_comeback_after_0_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_comeback_after_0_sae 1/1 Test: PASN authentication with SAE, with comeback flow where comeback after is set to 0 Starting AP wlan3 Connect STA wlan0 to AP sta: TK: 2bf72c6ebbea779b64ae2ea893c6683e KDK: ap : TK: 2bf72c6ebbea779b64ae2ea893c6683e KDK: sta: TK: 79a3ffd145cbbdafa4de983de31f4cf4 KDK: ap : TK: 79a3ffd145cbbdafa4de983de31f4cf4 KDK: PASS pasn_comeback_after_0_sae 5.02835 2022-07-26 18:04:22.179174 passed all 1 test case(s) 2022-07-26 18:04:22 ./run-tests.py pasn_sae_while_connected_same_channel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_sae_while_connected_same_channel 1/1 Test: PASN SAE authentication while connected same channel Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 Connect STA wlan0 to AP flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2412 -30 [WPA2-PSK-CCMP][ESS] test-pasn-wpa2-psk sta: TK: 228db526a26d8d5dce28d871e06941a8 KDK: ap : TK: 228db526a26d8d5dce28d871e06941a8 KDK: PASS pasn_sae_while_connected_same_channel 2.696113 2022-07-26 18:04:25.320936 passed all 1 test case(s) 2022-07-26 18:04:25 ./run-tests.py pasn_while_connected_same_channel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_while_connected_same_channel 1/1 Test: PASN authentication with WPA2/CCMP AP while connected same channel Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2412 -30 [WPA2-PSK-CCMP][ESS] test-wpa2-psk sta: TK: 3b78b86437197cedb556da5643087f43 KDK: ap : TK: 3b78b86437197cedb556da5643087f43 KDK: PASS pasn_while_connected_same_channel 2.103971 2022-07-26 18:04:27.868240 passed all 1 test case(s) 2022-07-26 18:04:27 ./run-tests.py sae_ocv_pmk_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_ocv_pmk_failure 1/1 Test: SAE with OCV and fetching PMK (failed 4-way handshake) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_ocv_pmk_failure 5.289814 2022-07-26 18:04:33.605729 passed all 1 test case(s) 2022-07-26 18:04:33 ./run-tests.py sae_pk_and_psk_invalid_password DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_and_psk_invalid_password 1/1 Test: SAE-PK and PSK using invalid password combination Starting AP wlan3 PASS sae_pk_and_psk_invalid_password 0.237032 2022-07-26 18:04:34.295076 passed all 1 test case(s) 2022-07-26 18:04:34 ./run-tests.py sae_pmksa_caching_pmkid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pmksa_caching_pmkid 1/1 Test: SAE and PMKSA caching (PMKID in AssocReq after SAE) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pmksa_caching_pmkid 1.644435 2022-07-26 18:04:36.385757 passed all 1 test case(s) 2022-07-26 18:04:36 ./run-tests.py sae_pwe_group_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_group_2 1/1 Test: SAE PWE derivation options with group 2 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_group_2 2.143293 2022-07-26 18:04:38.975016 passed all 1 test case(s) 2022-07-26 18:04:39 ./run-tests.py sae_reflection_attack_ffc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_reflection_attack_ffc 1/1 Test: SAE reflection attack (FFC) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_reflection_attack_ffc 1.306233 2022-07-26 18:04:40.725217 passed all 1 test case(s) 2022-07-26 18:04:40 ./run-tests.py scan_multi_bssid_4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid_4 1/1 Test: Scan and Multiple BSSID element (3) Starting AP wlan3 AP 02:00:00:00:03:01: {'id': '76', 'bssid': '02:00:00:00:03:01', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0401', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1658858681707087', 'age': '0', 'ie': '000b7472616e736d6974746564010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00472502000a53020100000131550101000a53020100000132550102000a53020100000133550103', 'flags': '[ESS]', 'ssid': 'transmitted', 'snr': '59', 'est_throughput': '65000', 'update_idx': '147', 'beacon_ie': '000b7472616e736d6974746564010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00472502000a53020100000131550101000a53020100000132550102000a53020100000133550103'} AP 02:00:00:00:03:02: {'id': '77', 'bssid': '02:00:00:00:03:02', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0001', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1658858681707087', 'age': '0', 'ie': '000131010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550101', 'flags': '[ESS]', 'ssid': '1', 'snr': '59', 'est_throughput': '65000', 'update_idx': '147', 'beacon_ie': '000131010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550101'} AP 02:00:00:00:03:03: {'id': '78', 'bssid': '02:00:00:00:03:03', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0001', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1658858681707087', 'age': '0', 'ie': '000132010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550102', 'flags': '[ESS]', 'ssid': '2', 'snr': '59', 'est_throughput': '65000', 'update_idx': '147', 'beacon_ie': '000132010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550102'} AP 02:00:00:00:03:00: {'id': '79', 'bssid': '02:00:00:00:03:00', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0001', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1658858681707087', 'age': '0', 'ie': '000133010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550103', 'flags': '[ESS]', 'ssid': '3', 'snr': '59', 'est_throughput': '65000', 'update_idx': '147', 'beacon_ie': '000133010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550103'} PASS scan_multi_bssid_4 1.291291 2022-07-26 18:04:42.460167 passed all 1 test case(s) 2022-07-26 18:04:42 ./run-tests.py scan_only DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_only 1/1 Test: Control interface behavior on scan parameters with type=only Starting AP wlan3 Full scan Limited channel scan Passive single-channel scan Active single-channel scan Active single-channel scan on AP's operating channel PASS scan_only 9.05832 2022-07-26 18:04:51.970640 passed all 1 test case(s) 2022-07-26 18:04:52 ./run-tests.py scan_specific_bssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_specific_bssid 1/1 Test: Scan for a specific BSSID Starting AP wlan3 PASS scan_specific_bssid 1.100645 2022-07-26 18:04:53.527499 passed all 1 test case(s) 2022-07-26 18:04:53 ./run-tests.py sigma_dut_ap_osen DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_osen 1/1 Test: sigma_dut controlled AP with OSEN Skip test case: sigma_dut not available SKIP sigma_dut_ap_osen 0.193894 2022-07-26 18:04:54.173526 passed all 0 test case(s) skipped 1 test case(s) 2022-07-26 18:04:54 ./run-tests.py sigma_dut_ap_sae_h2e_anti_clogging DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_sae_h2e_anti_clogging 1/1 Test: sigma_dut controlled AP with SAE H2E and anti-clogging token Skip test case: sigma_dut not available SKIP sigma_dut_ap_sae_h2e_anti_clogging 0.187204 2022-07-26 18:04:54.815778 passed all 0 test case(s) skipped 1 test case(s) 2022-07-26 18:04:54 ./run-tests.py sigma_dut_ap_transition_disable_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_transition_disable_change 1/1 Test: sigma_dut controlled AP and transition disabled indication change Skip test case: sigma_dut not available SKIP sigma_dut_ap_transition_disable_change 0.19262 2022-07-26 18:04:55.463850 passed all 0 test case(s) skipped 1 test case(s) 2022-07-26 18:04:55 ./run-tests.py sigma_dut_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_open 1/1 Test: sigma_dut controlled open network association Skip test case: sigma_dut not available SKIP sigma_dut_open 0.140338 2022-07-26 18:04:56.056807 passed all 0 test case(s) skipped 1 test case(s) 2022-07-26 18:04:56 ./run-tests.py sta_dynamic_random_mac_addr_scan_keep_oui DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_dynamic_random_mac_addr_scan_keep_oui 1/1 Test: Dynamically added wpa_supplicant interface and random MAC address for scan (keep OUI) Starting AP wlan3 Connect STA wlan5 to AP PASS sta_dynamic_random_mac_addr_scan_keep_oui 1.740142 2022-07-26 18:04:58.252761 passed all 1 test case(s) 2022-07-26 18:04:58 ./run-tests.py tspec_reassoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tspec_reassoc 1/1 Test: Reassociation to same BSS while having tspecs Starting AP wlan3 Connect STA wlan0 to AP PASS tspec_reassoc 5.887838 2022-07-26 18:05:04.597385 passed all 1 test case(s) 2022-07-26 18:05:04 ./run-tests.py wep_ht_vht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wep_ht_vht 1/1 Test: WEP and HT/VHT Starting AP wlan3 Connect STA wlan0 to AP hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy3', 'freq': '5180', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '1', 'num_sta_no_short_preamble': '1', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '1', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x13', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '36', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '0', 'ieee80211n': '0', 'ieee80211ac': '0', 'ieee80211ax': '0', 'ieee80211be': '0', 'beacon_int': '100', 'dtim_period': '2', 'supported_rates': '0c 12 18 24 30 48 60 6c', 'max_txpower': '23', 'bss[0]': 'wlan3', 'bssid[0]': '02:00:00:00:03:00', 'ssid[0]': 'test-vht40-wep', 'num_sta[0]': '1'} Country code at the end: 00 PASS wep_ht_vht 2.056202 2022-07-26 18:05:07.184763 passed all 1 test case(s) 2022-07-26 18:05:07 ./run-tests.py wmediumd_path_ttl DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wmediumd_path_ttl 1/1 Test: Mesh path request TTL PASS wmediumd_path_ttl 11.078001 2022-07-26 18:05:18.779096 passed all 1 test case(s) 2022-07-26 18:05:18 ./run-tests.py wnm_bss_tm_connect_cmd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_connect_cmd 1/1 Test: WNM BSS Transition Management and cfg80211 connect command Starting AP wlan3 Starting AP wlan4 Connect STA wlan5 to AP Preferred Candidate List (matching neighbor for another BSS) without Disassociation Imminent PASS wnm_bss_tm_connect_cmd 2.527301 2022-07-26 18:05:21.834342 passed all 1 test case(s) 2022-07-26 18:05:21 ./run-tests.py wnm_bss_tm_req_with_mbo_ie DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_req_with_mbo_ie 1/1 Test: WNM BSS transition request with MBO IE and reassociation delay attribute Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_bss_tm_req_with_mbo_ie 7.494796 2022-07-26 18:05:29.855716 passed all 1 test case(s) 2022-07-26 18:05:29 ./run-tests.py wpa2_ocv_ap_override_eapol_g1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_ap_override_eapol_g1 1/1 Test: OCV on 2.4 GHz and AP override EAPOL-Key group msg 1/2 Starting AP wlan3 Connect STA wlan0 to AP PASS wpa2_ocv_ap_override_eapol_g1 1.168247 2022-07-26 18:05:31.481803 passed all 1 test case(s) 2022-07-26 18:05:31 ./run-tests.py wpas_ap_dfs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_dfs 1/1 Test: wpa_supplicant AP mode - DFS Connect STA wlan1 to AP PASS wpas_ap_dfs 66.98126 2022-07-26 18:06:38.916697 passed all 1 test case(s) 2022-07-26 18:06:38 ./run-tests.py wpas_mesh_password_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_mesh_password_mismatch 1/1 Test: Mesh network and one device with mismatching password PASS wpas_mesh_password_mismatch 22.774845 2022-07-26 18:07:02.137312 passed all 1 test case(s) 2022-07-26 18:07:02 ./run-tests.py wps_ext_cred_proto_missing_cred DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_cred_proto_missing_cred 1/1 Test: WPS and Credential: Missing Credential Starting AP wlan3 PASS wps_ext_cred_proto_missing_cred 1.286407 2022-07-26 18:07:03.868596 passed all 1 test case(s) 2022-07-26 18:07:03 ./run-tests.py wps_ext_m2_ack DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_m2_ack 1/1 Test: WPS proto: M2 followed by ACK Starting AP wlan3 PASS wps_ext_m2_ack 1.270309 2022-07-26 18:07:05.587931 passed all 1 test case(s) 2022-07-26 18:07:05 ./run-tests.py wps_ext_proto_m4_missing_r_snonce1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_m4_missing_r_snonce1 1/1 Test: WPS and no R-SNonce1 in M4 Starting AP wlan3 PASS wps_ext_proto_m4_missing_r_snonce1 1.274356 2022-07-26 18:07:07.307945 passed all 1 test case(s) 2022-07-26 18:07:07 ./stop.sh