2022-10-08 10:50:32 export USER=root 2022-10-08 10:50:32 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client osu_client.c: In function ‘cmd_osu_select’: osu_client.c:2090:44: warning: ‘%s’ directive output may be truncated writing up to 985 bytes into a region of size 4 [-Wformat-truncation=] 2090 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 14); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~ osu_client.c:2090:4: note: ‘snprintf’ output between 1 and 986 bytes into a destination of size 4 2090 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 14); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2103:44: warning: ‘%s’ directive output may be truncated writing up to 994 bytes into a region of size 4 [-Wformat-truncation=] 2103 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 5); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~ osu_client.c:2103:4: note: ‘snprintf’ output between 1 and 995 bytes into a destination of size 4 2103 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 5); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2077:10: warning: ‘%s’ directive output may be truncated writing up to 990 bytes into a region of size 256 [-Wformat-truncation=] 2077 | "%s", buf + 9); | ^~ In file included from ../../src/utils/common.h:12, from osu_client.c:16: ../../src/utils/os.h:552:21: note: ‘snprintf’ output between 1 and 991 bytes into a destination of size 256 552 | #define os_snprintf snprintf osu_client.c:2076:4: note: in expansion of macro ‘os_snprintf’ 2076 | os_snprintf(last->osu_nai2, sizeof(last->osu_nai2), | ^~~~~~~~~~~ osu_client.c:2071:10: warning: ‘%s’ directive output may be truncated writing up to 991 bytes into a region of size 256 [-Wformat-truncation=] 2071 | "%s", buf + 8); | ^~ In file included from ../../src/utils/common.h:12, from osu_client.c:16: ../../src/utils/os.h:552:21: note: ‘snprintf’ output between 1 and 992 bytes into a destination of size 256 552 | #define os_snprintf snprintf osu_client.c:2070:4: note: in expansion of macro ‘os_snprintf’ 2070 | os_snprintf(last->osu_nai, sizeof(last->osu_nai), | ^~~~~~~~~~~ osu_client.c:2065:7: warning: ‘%s’ directive output may be truncated writing up to 989 bytes into a region of size 33 [-Wformat-truncation=] 2064 | snprintf(last->osu_ssid2, sizeof(last->osu_ssid2), | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2065 | "%s", buf + 10); | ~^~~~~~~~~~~~~~ osu_client.c:2064:4: note: ‘snprintf’ output between 1 and 990 bytes into a destination of size 33 2064 | snprintf(last->osu_ssid2, sizeof(last->osu_ssid2), | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2065 | "%s", buf + 10); | ~~~~~~~~~~~~~~~ osu_client.c:2059:7: warning: ‘%s’ directive output may be truncated writing up to 990 bytes into a region of size 33 [-Wformat-truncation=] 2058 | snprintf(last->osu_ssid, sizeof(last->osu_ssid), | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2059 | "%s", buf + 9); | ~^~~~~~~~~~~~~ osu_client.c:2058:4: note: ‘snprintf’ output between 1 and 991 bytes into a destination of size 33 2058 | snprintf(last->osu_ssid, sizeof(last->osu_ssid), | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2059 | "%s", buf + 9); | ~~~~~~~~~~~~~~ osu_client.c:2048:44: warning: ‘%s’ directive output may be truncated writing up to 995 bytes into a region of size 256 [-Wformat-truncation=] 2048 | snprintf(last->url, sizeof(last->url), "%s", buf + 4); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~ osu_client.c:2048:4: note: ‘snprintf’ output between 1 and 996 bytes into a destination of size 256 2048 | snprintf(last->url, sizeof(last->url), "%s", buf + 4); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2040:48: warning: ‘%s’ directive output may be truncated writing up to 986 bytes into a region of size 20 [-Wformat-truncation=] 2040 | snprintf(last->bssid, sizeof(last->bssid), "%s", | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~ 2041 | buf + 13); | ~~~~~~~~~ osu_client.c:2040:4: note: ‘snprintf’ output between 1 and 987 bytes into a destination of size 20 2040 | snprintf(last->bssid, sizeof(last->bssid), "%s", | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2041 | buf + 13); | ~~~~~~~~~ Building hostapd Building wpa_supplicant 2022-10-08 10:51:23 ./start.sh 2022-10-08 10:51:24 ./run-tests.py ap_country DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_country 1/1 Test: WPA2-PSK AP setting country code and using 5 GHz band Starting AP wlan3 Connect STA wlan0 to AP PASS ap_country 1.799542 2022-10-08 10:51:27.389600 passed all 1 test case(s) 2022-10-08 10:51:27 ./run-tests.py ap_ft_over_ds_pull_vlan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_over_ds_pull_vlan 1/1 Test: WPA2-PSK-FT AP over DS (pull PMK) with VLAN Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_over_ds_pull_vlan 3.089857 2022-10-08 10:51:30.945005 passed all 1 test case(s) 2022-10-08 10:51:30 ./run-tests.py ap_hs20_excluded_ssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_excluded_ssid 1/1 Test: Hotspot 2.0 exclusion based on SSID Starting AP wlan3 Starting AP wlan4 Verify network selection to AP wlan4 Verify network selection to AP wlan3 Verify network selection to AP wlan4 Verify network selection to AP wlan4 PASS ap_hs20_excluded_ssid 3.349515 2022-10-08 10:51:34.755698 passed all 1 test case(s) 2022-10-08 10:51:34 ./run-tests.py ap_hs20_remediation_required DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_remediation_required 1/1 Test: Hotspot 2.0 connection and remediation required from RADIUS Starting AP wlan3 PASS ap_hs20_remediation_required 1.341785 2022-10-08 10:51:36.536354 passed all 1 test case(s) 2022-10-08 10:51:36 ./run-tests.py ap_ht40_scan_ht20_conflict DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_scan_ht20_conflict 1/1 Test: HT40 co-ex scan conflict with HT 20 MHz AP Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht40_scan_ht20_conflict 3.335919 2022-10-08 10:51:40.311433 passed all 1 test case(s) 2022-10-08 10:51:40 ./run-tests.py ap_ht40_scan_legacy_conflict DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_scan_legacy_conflict 1/1 Test: HT40 co-ex scan conflict with legacy 20 MHz AP Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht40_scan_legacy_conflict 3.301575 2022-10-08 10:51:44.053475 passed all 1 test case(s) 2022-10-08 10:51:44 ./run-tests.py ap_ht_op_class_127 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht_op_class_127 1/1 Test: HT40 on operationg class 127 Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht_op_class_127 3.63227 2022-10-08 10:51:48.127132 passed all 1 test case(s) 2022-10-08 10:51:48 ./run-tests.py ap_open_pmf_default DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_open_pmf_default 1/1 Test: AP with open mode (no security) configuration and pmf=2 Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP PASS ap_open_pmf_default 1.752318 2022-10-08 10:51:50.320215 passed all 1 test case(s) 2022-10-08 10:51:50 ./run-tests.py ap_pmf_beacon_protection_bip_gmac_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_pmf_beacon_protection_bip_gmac_256 1/1 Test: WPA2-PSK Beacon protection (BIP-GMAC-256) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP STA key: {'ifindex': 'wlan0', 'key': 'a081b8433b2b1077bab62ffb76d7a6855936934df559cc421b2c7a3310730213', 'icverrors': '0', 'replays': '0', 'rx_spec': '00000000000d', 'tx_spec': '000000000000', 'algorithm': '00-0f-ac:12', 'hw_key_idx': '0', 'keyidx': '6', 'flags': '0x0', 'keylen': '32'} AP key: {'ifindex': 'wlan3', 'key': 'a081b8433b2b1077bab62ffb76d7a6855936934df559cc421b2c7a3310730213', 'icverrors': '0', 'replays': '0', 'rx_spec': '000000000000', 'tx_spec': '00000000000d', 'algorithm': '00-0f-ac:12', 'hw_key_idx': '0', 'keyidx': '6', 'flags': '0x0', 'keylen': '32'} wlantest BIP counters: valid=0 invalid=0 missing=0 PASS ap_pmf_beacon_protection_bip_gmac_256 2.747867 2022-10-08 10:51:53.510823 passed all 1 test case(s) 2022-10-08 10:51:53 ./run-tests.py ap_reassociation_to_same_bss DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_reassociation_to_same_bss 1/1 Test: Reassociate to the same BSS Starting AP wlan3 Connect STA wlan0 to AP PASS ap_reassociation_to_same_bss 11.616042 2022-10-08 10:52:05.566343 passed all 1 test case(s) 2022-10-08 10:52:05 ./run-tests.py ap_vht80b DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht80b 1/1 Test: VHT with 80 MHz channel width (HT40- channel 40) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS ap_vht80b 2.115856 2022-10-08 10:52:08.119056 passed all 1 test case(s) 2022-10-08 10:52:08 ./run-tests.py ap_wpa2_already_in_bridge DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_already_in_bridge 1/1 Test: hostapd behavior with interface already in bridge Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_already_in_bridge 1.46253 2022-10-08 10:52:10.022114 passed all 1 test case(s) 2022-10-08 10:52:10 ./run-tests.py ap_wpa2_disable_eapol_retry DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_disable_eapol_retry 1/1 Test: WPA2-PSK disable EAPOL-Key retry Starting AP wlan3 Verify working 4-way handshake without retries Connect STA wlan0 to AP Verify no retransmission of message 3/4 Connect STA wlan0 to AP PASS ap_wpa2_disable_eapol_retry 5.486042 2022-10-08 10:52:15.948640 passed all 1 test case(s) 2022-10-08 10:52:15 ./run-tests.py ap_wpa2_disable_eapol_retry_group DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_disable_eapol_retry_group 1/1 Test: WPA2-PSK disable EAPOL-Key retry for group handshake Starting AP wlan3 Connect STA wlan1 to AP Connect STA wlan0 to AP PASS ap_wpa2_disable_eapol_retry_group 6.7672 2022-10-08 10:52:23.156418 passed all 1 test case(s) 2022-10-08 10:52:23 ./run-tests.py ap_wpa2_eap_pwd_nthash DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_pwd_nthash 1/1 Test: WPA2-Enterprise connection using EAP-pwd and NTHash Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_wpa2_eap_pwd_nthash 4.088823 2022-10-08 10:52:27.686618 passed all 1 test case(s) 2022-10-08 10:52:27 ./run-tests.py ap_wpa2_eap_tls_domain_suffix_match_cn DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_domain_suffix_match_cn 1/1 Test: WPA2-Enterprise using EAP-TLS and domain suffix match (CN) Starting AP wlan3 Connect STA wlan1 to AP PASS ap_wpa2_eap_tls_domain_suffix_match_cn 1.121439 2022-10-08 10:52:29.251101 passed all 1 test case(s) 2022-10-08 10:52:29 ./run-tests.py ap_wpa2_eap_tls_ec_and_rsa DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_ec_and_rsa 1/1 Test: EAP-TLS and both EC and RSA sertificates certificates Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_wpa2_eap_tls_ec_and_rsa 1.621033 2022-10-08 10:52:31.312575 passed all 1 test case(s) 2022-10-08 10:52:31 ./run-tests.py ap_wpa2_psk_ext_eapol_type_diff DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ext_eapol_type_diff 1/1 Test: WPA2 4-way handshake using external EAPOL supplicant Starting AP wlan3 Connect STA wlan0 to AP Replay same data back Send EAPOL-Key msg 4/4 PASS ap_wpa2_psk_ext_eapol_type_diff 1.089255 2022-10-08 10:52:32.842376 passed all 1 test case(s) 2022-10-08 10:52:32 ./run-tests.py ap_wps_conf_and_sae_h2e DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_conf_and_sae_h2e 1/1 Test: WPS PIN provisioning with configured AP using PSK+SAE(H2E) Starting AP wlan3 PASS ap_wps_conf_and_sae_h2e 1.775212 2022-10-08 10:52:35.059670 passed all 1 test case(s) 2022-10-08 10:52:35 ./run-tests.py ap_wps_er_http_proto_subscribe_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto_subscribe_oom 1/1 Test: WPS ER HTTP protocol testing - subscribe OOM HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" HTTP server received: Ignore HTTP request: HTTP server received: Ignore HTTP request: PASS ap_wps_er_http_proto_subscribe_oom 6.296127 2022-10-08 10:52:41.797364 passed all 1 test case(s) 2022-10-08 10:52:41 ./run-tests.py ap_wps_er_learn_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_learn_oom 1/1 Test: WPS ER learn OOM Starting AP wlan3 PASS ap_wps_er_learn_oom 6.713988 2022-10-08 10:52:48.949115 passed all 1 test case(s) 2022-10-08 10:52:48 ./run-tests.py ap_wps_init_2ap_pbc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_init_2ap_pbc 1/1 Test: Initial two-radio AP configuration with first WPS PBC Enrollee Starting AP wlan3 Starting AP wlan4 WPS provisioning step PASS ap_wps_init_2ap_pbc 7.229836 2022-10-08 10:52:56.616998 passed all 1 test case(s) 2022-10-08 10:52:56 ./run-tests.py ap_wps_mixed_cred DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_mixed_cred 1/1 Test: WPS 2.0 STA merging mixed mode WPA/WPA2 credentials Starting AP wlan3 PASS ap_wps_mixed_cred 1.21759 2022-10-08 10:52:58.274223 passed all 1 test case(s) 2022-10-08 10:52:58 ./run-tests.py ap_wps_pbc_overlap_2ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_pbc_overlap_2ap 1/1 Test: WPS PBC session overlap with two active APs Starting AP wlan3 Starting AP wlan4 WPS provisioning step PASS ap_wps_pbc_overlap_2ap 5.651517 2022-10-08 10:53:04.368300 passed all 1 test case(s) 2022-10-08 10:53:04 ./run-tests.py autogo_many DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_many 1/1 Test: P2P autonomous GO with large number of GO instances Was able to add 63 groups PASS autogo_many 32.205786 2022-10-08 10:53:37.014958 passed all 1 test case(s) 2022-10-08 10:53:37 ./run-tests.py bgscan_simple_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START bgscan_simple_oom 1/1 Test: bgscan_simple OOM Starting AP wlan3 Connect STA wlan0 to AP PASS bgscan_simple_oom 1.09931 2022-10-08 10:53:38.553682 passed all 1 test case(s) 2022-10-08 10:53:38 ./run-tests.py connect_cmd_wpa2_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START connect_cmd_wpa2_psk 1/1 Test: WPA2-PSK connection using cfg80211 connect command Starting AP wlan3 Connect STA wlan5 to AP PASS connect_cmd_wpa2_psk 1.33728 2022-10-08 10:53:40.329782 passed all 1 test case(s) 2022-10-08 10:53:40 ./run-tests.py dbus_ap_scan_2_ap_mode_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_ap_scan_2_ap_mode_scan 1/1 Test: AP_SCAN 2 AP mode and D-Bus Scan() Connect STA wlan1 to AP PASS dbus_ap_scan_2_ap_mode_scan 1.127135 2022-10-08 10:53:41.896744 passed all 1 test case(s) 2022-10-08 10:53:41 ./run-tests.py dbus_creds DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_creds 1/1 Test: D-Bus interworking credentials PASS dbus_creds 0.143389 2022-10-08 10:53:42.481583 passed all 1 test case(s) 2022-10-08 10:53:42 ./run-tests.py dbus_getall_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_getall_oom 1/1 Test: D-Bus GetAll wpa_config_get_all() OOM PASS dbus_getall_oom 0.23576 2022-10-08 10:53:43.157447 passed all 1 test case(s) 2022-10-08 10:53:43 ./run-tests.py dbus_introspect_busctl DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_introspect_busctl 1/1 Test: D-Bus introspection with busctl busctl introspect fi.w1.wpa_supplicant1 /fi/w1/wpa_supplicant1 busctl stdout: b'NAME TYPE SIGNATURE RESULT/VALUE FLAGS\nfi.w1.wpa_supplicant1 interface - - -\n.CreateInterface method a{sv} o -\n.ExpectDisconnect method - - -\n.GetInterface method s o -\n.RemoveInterface method o - -\n.Capabilities property as 13 "ap" "ibss-rsn" "p2p" "interworking"\xe2\x80\xa6 emits-change\n.DebugLevel property s "msgdump" emits-change writable\n.DebugShowKeys property b true emits-change writable\n.DebugTimestamp property b true emits-change writable\n.EapMethods property as 25 "MD5" "TLS" "UNAUTH-TLS" "WFA-UNAUTH\xe2\x80\xa6 emits-change\n.Interfaces property ao 1 "/fi/w1/wpa_supplicant1/Interfaces/0" emits-change\n.WFDIEs property ay 0 emits-change writable\n.InterfaceAdded signal oa{sv} - -\n.InterfaceRemoved signal o - -\n.PropertiesChanged signal a{sv} - -\norg.freedesktop.DBus.Introspectable interface - - -\n.Introspect method - s -\norg.freedesktop.DBus.Properties interface - - -\n.Get method ss v -\n.GetAll method s a{sv} -\n.Set method ssv - -' busctl introspect fi.w1.wpa_supplicant1 /fi/w1/wpa_supplicant1/Interfaces busctl stdout: b'NAME TYPE SIGNATURE RESULT/VALUE FLAGS' busctl introspect fi.w1.wpa_supplicant1 /fi/w1/wpa_supplicant1/Interfaces/0 busctl stdout: b'' busctl stderr: Failed to get all properties on interface fi.w1.wpa_supplicant1.Interface.Mesh: No readable properties in this interface Starting AP wlan3 busctl introspect fi.w1.wpa_supplicant1 /fi/w1/wpa_supplicant1/Interfaces/0/BSSs/0 busctl stdout: b'NAME TYPE SIGNATURE RESULT/VALUE FLAGS' busctl introspect fi.w1.wpa_supplicant1 /fi/w1/wpa_supplicant1/Interfaces/0/Networks/0 busctl stdout: b'NAME TYPE SIGNATURE RESULT/VALUE FLAGS\nfi.w1.wpa_supplicant1.Network interface - - -\n.Enabled property b true emits-change writable\n.Properties property a{sv} 97 "ssid" s "\\"test\\"" "scan_ssid" s "0\xe2\x80\xa6 emits-change writable\n.PropertiesChanged signal a{sv} - -\norg.freedesktop.DBus.Introspectable interface - - -\n.Introspect method - s -\norg.freedesktop.DBus.Properties interface - - -\n.Get method ss v -\n.GetAll method s a{sv} -\n.Set method ssv - -' PASS dbus_introspect_busctl 0.788489 2022-10-08 10:53:44.387109 passed all 1 test case(s) 2022-10-08 10:53:44 ./run-tests.py dbus_remove_connected DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_remove_connected 1/1 Test: D-Bus RemoveAllNetworks while connected Starting AP wlan3 PASS dbus_remove_connected 2.652125 2022-10-08 10:53:47.486271 passed all 1 test case(s) 2022-10-08 10:53:47 ./run-tests.py dbus_tdls_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_tdls_invalid 1/1 Test: D-Bus invalid TDLS operations Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS dbus_tdls_invalid 1.733615 2022-10-08 10:53:49.677235 passed all 1 test case(s) 2022-10-08 10:53:49 ./run-tests.py dbus_vendor_elem DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_vendor_elem 1/1 Test: D-Bus vendor element operations PASS dbus_vendor_elem 0.150101 2022-10-08 10:53:50.277805 passed all 1 test case(s) 2022-10-08 10:53:50 ./run-tests.py discovery_social_plus_one DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START discovery_social_plus_one 1/1 Test: P2P device discovery with social-plus-one Start autonomous GO wlan0 Wait for initial progressive find phases Verify whether the GO on non-social channel can be found PASS discovery_social_plus_one 6.459661 2022-10-08 10:53:57.186367 passed all 1 test case(s) 2022-10-08 10:53:57 ./run-tests.py dpp_config_dpp_gen_secp384r1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_dpp_gen_secp384r1 1/1 Test: Generate DPP Config Object for DPP network (P-384) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_dpp_gen_secp384r1 0.247828 2022-10-08 10:53:57.883431 passed all 1 test case(s) 2022-10-08 10:53:57 ./run-tests.py dpp_config_jwk_error_no_kty DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jwk_error_no_kty 1/1 Test: DPP Config Object JWK error - no kty dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jwk_error_no_kty 2.242841 2022-10-08 10:54:00.575007 passed all 1 test case(s) 2022-10-08 10:54:00 ./run-tests.py dpp_config_jws_error_prot_hdr_no_kid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_jws_error_prot_hdr_no_kid 1/1 Test: DPP Config Object JWS error - protected header - no kid dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_jws_error_prot_hdr_no_kid 2.215434 2022-10-08 10:54:03.238381 passed all 1 test case(s) 2022-10-08 10:54:03 ./run-tests.py dpp_config_legacy_psk_hex DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_legacy_psk_hex 1/1 Test: DPP Config Object for legacy network using PSK dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_legacy_psk_hex 0.212086 2022-10-08 10:54:03.898407 passed all 1 test case(s) 2022-10-08 10:54:03 ./run-tests.py dpp_config_too_long_discovery_ssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_config_too_long_discovery_ssid 1/1 Test: DPP Config Object error - too long discovery::ssid dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_config_too_long_discovery_ssid 2.246737 2022-10-08 10:54:06.595163 passed all 1 test case(s) 2022-10-08 10:54:06 ./run-tests.py dpp_enterprise_tcp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_enterprise_tcp 1/1 Test: DPP over TCP for enterprise provisioning CSR: 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 PASS dpp_enterprise_tcp 2.233032 2022-10-08 10:54:09.282290 passed all 1 test case(s) 2022-10-08 10:54:09 ./run-tests.py dpp_nfc_negotiated_handover_hostapd_req DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_nfc_negotiated_handover_hostapd_req 1/1 Test: DPP bootstrapping via NFC negotiated handover (hostapd as requestor) Starting AP wlan3 Generated URI[0]: DPP:C:81/6,11;M:020000000300;V:2;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADP0TQ18Is0/xdlXpz8jCd44Jdc+Auh3eVOAo3ES2j1so=;; Generated URI[1]: DPP:C:81/1,6,11;M:020000000000;V:2;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgACG14qQFVRPQ8Z9k8eWFGAWlCXZknNvMiz5KBhEZ6HavE=;; Updated local bootstrapping info: type=NFC-URI mac_addr=02:00:00:00:00:00 info= num_freq=1 use_freq=2437 curve=prime256v1 pkhash=d28ae954d89cfa68b9c402a0a219f66fe24ac1746d4949dd8beb2e9967592091 version=0 Updated URI[1]: DPP:C:81/6;M:020000000000;V:2;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgACG14qQFVRPQ8Z9k8eWFGAWlCXZknNvMiz5KBhEZ6HavE=;; PASS dpp_nfc_negotiated_handover_hostapd_req 2.712711 2022-10-08 10:54:12.446259 passed all 1 test case(s) 2022-10-08 10:54:12 ./run-tests.py dpp_pkex_nak_curve_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_pkex_nak_curve_change 1/1 Test: DPP PKEX with netAccessKey curve change Skip test case: DPP version 3 not supported SKIP dpp_pkex_nak_curve_change 0.14066 2022-10-08 10:54:13.038128 passed all 0 test case(s) skipped 1 test case(s) 2022-10-08 10:54:13 ./run-tests.py dpp_proto_auth_conf_no_i_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_conf_no_i_auth 1/1 Test: DPP protocol testing - no I-Auth in Auth Conf PASS dpp_proto_auth_conf_no_i_auth 2.201043 2022-10-08 10:54:15.689262 passed all 1 test case(s) 2022-10-08 10:54:15 ./run-tests.py dpp_proto_auth_resp_status_invalid_i_bootstrap_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_resp_status_invalid_i_bootstrap_key 1/1 Test: DPP protocol testing - invalid I-bootstrap key in Auth Resp(status) PASS dpp_proto_auth_resp_status_invalid_i_bootstrap_key 0.303287 2022-10-08 10:54:16.444326 passed all 1 test case(s) 2022-10-08 10:54:16 ./run-tests.py dpp_proto_auth_resp_status_invalid_r_bootstrap_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_auth_resp_status_invalid_r_bootstrap_key 1/1 Test: DPP protocol testing - invalid R-bootstrap key in Auth Resp(status) Failure not reported Traceback (most recent call last): File "/lkp/benchmarks/hwsim/tests/hwsim/./run-tests.py", line 534, in main t(dev, apdev) File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 3670, in test_dpp_proto_auth_resp_status_invalid_r_bootstrap_key run_dpp_proto_auth_resp_missing(dev, 70, File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 3632, in run_dpp_proto_auth_resp_missing wait_dpp_fail(dev[1], reason) File "/lkp/benchmarks/hwsim/tests/hwsim/test_dpp.py", line 55, in wait_dpp_fail raise Exception("Failure not reported") Exception: Failure not reported FAIL dpp_proto_auth_resp_status_invalid_r_bootstrap_key 5.215699 2022-10-08 10:54:22.109392 passed 0 test case(s) skipped 0 test case(s) failed tests: dpp_proto_auth_resp_status_invalid_r_bootstrap_key 2022-10-08 10:54:22 ./run-tests.py dpp_proto_pkex_cr_req_no_i_auth_tag DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_proto_pkex_cr_req_no_i_auth_tag 1/1 Test: DPP protocol testing - no I-Auth Tag in PKEX Commit-Reveal Request PASS dpp_proto_pkex_cr_req_no_i_auth_tag 0.241751 2022-10-08 10:54:22.801980 passed all 1 test case(s) 2022-10-08 10:54:22 ./run-tests.py dpp_uri_version DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_uri_version 1/1 Test: DPP URI version information Generated URI: DPP:V:2;K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgACnXTvIA7PScL7HGC7DIKnkUMxu3tzxTHsBu2TprznB1s=;; Parsed URI info: type=QRCODE mac_addr=00:00:00:00:00:00 info= num_freq=0 use_freq=0 curve=prime256v1 pkhash=e68a523c674749cad0631f760978240936ebc84070fd47c0543cab27cd0f034b version=2 Generated URI: DPP:K:MDkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDIgADQHMtbg6++T3BAEvGVCo+M91Rb5MbwcWIswuadjJOpmw=;; Parsed URI info: type=QRCODE mac_addr=00:00:00:00:00:00 info= num_freq=0 use_freq=0 curve=prime256v1 pkhash=ec9f260b1fdf2db4ab319453e5495d9460e8adb259e060ca2efa97793537ea57 version=0 PASS dpp_uri_version 0.139178 2022-10-08 10:54:23.389404 passed all 1 test case(s) 2022-10-08 10:54:23 ./run-tests.py eap_proto_peap_errors_server DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_peap_errors_server 1/1 Test: EAP-PEAP local error cases on server Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_peap_errors_server 2.810304 2022-10-08 10:54:26.649475 passed all 1 test case(s) 2022-10-08 10:54:26 ./run-tests.py eap_teap_basic_password_auth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_basic_password_auth 1/1 Test: EAP-TEAP with Basic-Password-Auth Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_basic_password_auth 1.131956 2022-10-08 10:54:28.228383 passed all 1 test case(s) 2022-10-08 10:54:28 ./run-tests.py eap_ttls_ext_cert_check DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_ttls_ext_cert_check 1/1 Test: EAP-TTLS and external server certification validation Connect STA wlan0 to AP Starting AP wlan3 Server certificate CN=server.w1.fi Issuer certificate CN=Root CA PASS eap_ttls_ext_cert_check 1.601333 2022-10-08 10:54:30.272025 passed all 1 test case(s) 2022-10-08 10:54:30 ./run-tests.py ext_password_psk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ext_password_psk 1/1 Test: External password storage for PSK Starting AP wlan3 Connect STA wlan0 to AP PASS ext_password_psk 1.114656 2022-10-08 10:54:31.827002 passed all 1 test case(s) 2022-10-08 10:54:31 ./run-tests.py fils_discovery_frame DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_discovery_frame 1/1 Test: FILS Discovery frame generation Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Skip test case: FILS Discovery frame transmission not supported SKIP fils_discovery_frame 0.343604 2022-10-08 10:54:32.610097 passed all 0 test case(s) skipped 1 test case(s) 2022-10-08 10:54:32 ./run-tests.py fils_offload_to_driver2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_offload_to_driver2 1/1 Test: FILS offload to driver Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan5 to AP PASS fils_offload_to_driver2 1.748796 2022-10-08 10:54:34.801145 passed all 1 test case(s) 2022-10-08 10:54:34 ./run-tests.py fils_sk_erp_radius_ext DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_erp_radius_ext 1/1 Test: FILS SK using ERP and external RADIUS server Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_sk_erp_radius_ext 1.568515 2022-10-08 10:54:36.811955 passed all 1 test case(s) 2022-10-08 10:54:36 ./run-tests.py fst_ap_ack_response_with_session_not_set_up DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_ack_response_with_session_not_set_up 1/1 Test: FST AP ack response with session not set up Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad scenario was handled correctly (Ack response received before the session was set up) PASS fst_ap_ack_response_with_session_not_set_up 7.752797 2022-10-08 10:54:45.006186 passed all 1 test case(s) 2022-10-08 10:54:45 ./run-tests.py fst_ap_config_default DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_config_default 1/1 Test: FST AP configuration default parameters PASS fst_ap_config_default 6.643662 2022-10-08 10:54:52.091134 passed all 1 test case(s) 2022-10-08 10:54:52 ./run-tests.py fst_ap_start_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_start_session 1/1 Test: FST AP start session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Session added and set PASS fst_ap_start_session 2.634298 2022-10-08 10:54:55.165040 passed all 1 test case(s) 2022-10-08 10:54:55 ./run-tests.py fst_sta_config_pri_big DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_config_pri_big 1/1 Test: FST STA configuration Priority too large kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - try again after a second kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - could not kill the process PASS fst_sta_config_pri_big 1.369885 2022-10-08 10:54:56.974051 passed all 1 test case(s) 2022-10-08 10:54:57 ./run-tests.py fst_sta_config_pri_nan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_config_pri_nan 1/1 Test: FST STA configuration Priority not a number kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - try again after a second kill_pid: pidfile logs/current/mywpa_supplicant.pid does not exist - could not kill the process PASS fst_sta_config_pri_nan 1.359204 2022-10-08 10:54:58.774500 passed all 1 test case(s) 2022-10-08 10:54:58 ./run-tests.py fst_sta_transfer_session_setup_skipped DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_sta_transfer_session_setup_skipped 1/1 Test: FST STA transfer session - setup skipped Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (Session setup skipped) PASS fst_sta_transfer_session_setup_skipped 2.645557 2022-10-08 10:55:01.855504 passed all 1 test case(s) 2022-10-08 10:55:01 ./run-tests.py gas_fragment DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_fragment 1/1 Test: GAS fragmentation Starting AP wlan3 PASS gas_fragment 0.71148 2022-10-08 10:55:03.007672 passed all 1 test case(s) 2022-10-08 10:55:03 ./run-tests.py go_search_non_social2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START go_search_non_social2 1/1 Test: P2P_FIND with freq parameter to scan a single channel (2) Start autonomous GO wlan0 PASS go_search_non_social2 3.787621 2022-10-08 10:55:07.237151 passed all 1 test case(s) 2022-10-08 10:55:07 ./run-tests.py hostapd_oom_wpa2_psk_connect DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hostapd_oom_wpa2_psk_connect 1/1 Test: hostapd failing during WPA2-PSK mode connection due to OOM Starting AP wlan3 Iteration 1 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 2 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 3 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 4 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 5 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 6 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 7 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 8 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 9 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 10 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 11 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 12 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 13 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 14 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 15 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 16 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 17 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 18 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 19 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 20 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 21 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 22 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 23 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 24 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 25 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 26 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 27 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 28 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 29 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 30 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 31 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 32 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 33 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 34 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 35 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 36 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 37 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 38 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 39 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 40 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 41 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 42 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 43 Connect STA wlan0 to AP Timeout while waiting for connection in iteration 43 GET_ALLOC_FAIL: 0:main Iteration 44 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 45 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 46 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 47 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 48 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 49 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 50 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 51 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 52 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 53 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 54 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 55 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 56 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 57 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 58 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 59 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 60 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 61 Connect STA wlan0 to AP GET_ALLOC_FAIL: 0:main Iteration 62 Connect STA wlan0 to AP GET_ALLOC_FAIL: FAIL Iteration 63 Connect STA wlan0 to AP GET_ALLOC_FAIL: 1:main Iteration 64 Connect STA wlan0 to AP GET_ALLOC_FAIL: 2:main Iteration 65 Connect STA wlan0 to AP GET_ALLOC_FAIL: 3:main Iteration 66 Connect STA wlan0 to AP GET_ALLOC_FAIL: 4:main PASS hostapd_oom_wpa2_psk_connect 34.003529 2022-10-08 10:55:41.684641 passed all 1 test case(s) 2022-10-08 10:55:41 ./run-tests.py ibss_rsn_eapol_trigger DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_rsn_eapol_trigger 1/1 Test: IBSS RSN and EAPOL trigger for a new peer wlan0 waiting for IBSS start/join to complete Too short EAPOL frame RSN: EAPOL frame (type 255) discarded, not a Key frame RSN: EAPOL frame payload size 96 invalid (frame size 99) RSN: EAPOL-Key type (255) unknown, discarded RSN: Timeout on waiting Authentication frame response PASS ibss_rsn_eapol_trigger 10.737356 2022-10-08 10:55:52.869525 passed all 1 test case(s) 2022-10-08 10:55:52 ./run-tests.py obss_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START obss_scan 1/1 Test: Overlapping BSS scan request Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP SIGNAL_POLL: RSSI=-30 LINKSPEED=1 NOISE=-92 FREQUENCY=2437 WIDTH=40 MHz CENTER_FRQ1=2427 AVG_RSSI=-30 AVG_BEACON_RSSI=-30 Waiting for OBSS scan to occur 20/40 BSS Coexistence report received PASS obss_scan 16.252809 2022-10-08 10:56:09.564335 passed all 1 test case(s) 2022-10-08 10:56:09 ./run-tests.py p2p_channel_avoid3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_channel_avoid3 1/1 Test: P2P and avoid frequencies driver event on 5 GHz Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group Re-invoke persistent group from GO wlan0: Trying to discover peer 02:00:00:00:01:00 flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:00:00 5745 -20 [WPA2-PSK-CCMP][WPS][ESS][P2P] DIRECT-1s PASS p2p_channel_avoid3 7.080663 2022-10-08 10:56:17.086738 passed all 1 test case(s) 2022-10-08 10:56:17 ./run-tests.py p2p_go_move_scm_peer_supports DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_go_move_scm_peer_supports 1/1 Test: P2P GO move due to SCM operation preference (peer supports) Start GO negotiation wlan7 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:07:00 wlan7: Trying to discover peer 02:00:00:00:01:00 Group formed Starting AP wlan3 Connecting client to to an AP on channel 11 Connect STA wlan7 to AP Country code at the end: 00 PASS p2p_go_move_scm_peer_supports 4.990182 2022-10-08 10:56:22.521563 passed all 1 test case(s) 2022-10-08 10:56:22 ./run-tests.py p2ps_nonexact_search DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_nonexact_search 1/1 Test: P2PS nonexact seek request PASS p2ps_nonexact_search 0.460516 2022-10-08 10:56:23.424478 passed all 1 test case(s) 2022-10-08 10:56:23 ./run-tests.py p2ps_stale_group_removal DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_stale_group_removal 1/1 Test: P2PS stale group removal Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed PASS p2ps_stale_group_removal 8.290087 2022-10-08 10:56:32.154816 passed all 1 test case(s) 2022-10-08 10:56:32 ./run-tests.py pasn_ccmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_ccmp 1/1 Test: PASN authentication with WPA2/CCMP AP Starting AP wlan3 sta: TK: 6235b0bcf1dae8df416a1da85950b588 KDK: ap : TK: 6235b0bcf1dae8df416a1da85950b588 KDK: PASS pasn_ccmp 1.046884 2022-10-08 10:56:33.642301 passed all 1 test case(s) 2022-10-08 10:56:33 ./run-tests.py pasn_fils_sha256_connected_same_channel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_fils_sha256_connected_same_channel 1/1 Test: PASN FILS authentication using SHA-256 while connected same channel Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP Starting AP wlan4 Connect STA wlan0 to AP flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:04:00 2412 -30 [ESS] open 02:00:00:00:03:00 2412 -30 [WPA2-FILS-SHA256-CCMP][ESS][FILS] fils sta: TK: 874b93d77b973afd951797582e3828c0 KDK: ap : TK: 874b93d77b973afd951797582e3828c0 KDK: PASS pasn_fils_sha256_connected_same_channel 3.179615 2022-10-08 10:56:37.264083 passed all 1 test case(s) 2022-10-08 10:56:37 ./run-tests.py pasn_gcmp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_gcmp 1/1 Test: PASN authentication with WPA2/GCMP AP Starting AP wlan3 sta: TK: 22a2b76e774625f53c750160e96ef488 KDK: ap : TK: 22a2b76e774625f53c750160e96ef488 KDK: PASS pasn_gcmp 1.044453 2022-10-08 10:56:38.752658 passed all 1 test case(s) 2022-10-08 10:56:38 ./run-tests.py persistent_group_invite_removed_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START persistent_group_invite_removed_client 1/1 Test: P2P persistent group client removal and re-invitation Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Remove client from the group Re-invite the removed client to join the group wlan0: Trying to discover peer 02:00:00:00:01:00 Re-invite after client removed persistent group info wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 Terminate persistent group PASS persistent_group_invite_removed_client 12.743127 2022-10-08 10:56:51.951339 passed all 1 test case(s) 2022-10-08 10:56:51 ./run-tests.py persistent_group_peer_dropped2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START persistent_group_peer_dropped2 1/1 Test: P2P persistent group formation and re-invocation with peer having dropped group (2) Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group Re-invoke persistent group from GO wlan0: Trying to discover peer 02:00:00:00:01:00 Terminate persistent group Remove group on the client and try to invite from the GO wlan0: Trying to discover peer 02:00:00:00:01:00 Verify that a new group can be formed Form a persistent group Start GO negotiation wlan0 -> wlan1 wlan1: Trying to discover peer 02:00:00:00:00:00 wlan0: Trying to discover peer 02:00:00:00:01:00 Group formed Terminate persistent group PASS persistent_group_peer_dropped2 8.149822 2022-10-08 10:57:00.543122 passed all 1 test case(s) 2022-10-08 10:57:00 ./run-tests.py proxyarp_open_ebtables_ipv6 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START proxyarp_open_ebtables_ipv6 1/1 Test: ProxyARP with open network (IPv6) Starting AP wlan3 Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Bridge setup: bridge name bridge id STP enabled interfaces ap-br0 8000.86c5af5098d4 no wlan3 wlan4 Bridge showstp: ap-br0 bridge id 8000.86c5af5098d4 designated root 8000.86c5af5098d4 root port 0 path cost 0 max age 20.00 bridge max age 20.00 hello time 2.00 bridge hello time 2.00 forward delay 0.00 bridge forward delay 0.00 ageing time 300.00 hello timer 0.00 tcn timer 0.00 topology change timer 0.00 gc timer 298.29 flags wlan3 (1) port id 8001 state forwarding designated root 8000.86c5af5098d4 path cost 100 designated bridge 8000.86c5af5098d4 message age timer 0.00 designated port 8001 forward delay timer 0.00 designated cost 0 hold timer 0.00 flags hairpin mode 1 wlan4 (2) port id 8002 state forwarding designated root 8000.86c5af5098d4 path cost 100 designated bridge 8000.86c5af5098d4 message age timer 0.00 designated port 8002 forward delay timer 0.00 designated cost 0 hold timer 0.00 flags After connect (showmacs): port no mac addr is local? ageing timer 1 02:00:00:00:00:00 no 0.05 1 02:00:00:00:01:00 no 0.01 2 02:00:00:00:02:00 no 0.40 1 02:00:00:00:03:00 yes 0.00 1 02:00:00:00:03:00 yes 0.00 2 02:00:00:00:04:00 yes 0.00 2 02:00:00:00:04:00 yes 0.00 After connect: ['aaaa:bbbb:eeee::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT', 'aaaa:bbbb:cccc::2 dev ap-br0 lladdr 02:00:00:00:00:00 PERMANENT', 'aaaa:bbbb:dddd::2 dev ap-br0 lladdr 02:00:00:00:01:00 PERMANENT'] After disconnect (showmacs): port no mac addr is local? ageing timer 2 02:00:00:00:02:00 no 1.01 1 02:00:00:00:03:00 yes 0.00 1 02:00:00:00:03:00 yes 0.00 2 02:00:00:00:04:00 yes 0.00 2 02:00:00:00:04:00 yes 0.00 After disconnect: [] ebtables results: Bridge table: filter Bridge chain: INPUT, entries: 0, policy: ACCEPT Bridge chain: FORWARD, entries: 4, policy: ACCEPT -p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type neighbour-solicitation -j DROP , pcnt = 16 -- bcnt = 1142 -p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type neighbour-advertisement -j DROP , pcnt = 2 -- bcnt = 128 -p IPv6 -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type router-solicitation -j DROP , pcnt = 0 -- bcnt = 0 -p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type 143/0:255 -j DROP , pcnt = 6 -- bcnt = 456 Bridge chain: OUTPUT, entries: 4, policy: ACCEPT -p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type neighbour-solicitation -j DROP , pcnt = 3 -- bcnt = 216 -p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type neighbour-advertisement -j DROP , pcnt = 1 -- bcnt = 64 -p IPv6 -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type router-solicitation -j DROP , pcnt = 1 -- bcnt = 56 -p IPv6 -d Multicast -o wlan3 --ip6-proto ipv6-icmp --ip6-icmp-type 143/0:255 -j DROP , pcnt = 4 -- bcnt = 384 dev0 seen NS: [['33:33:ff:00:00:02', '02:00:00:00:00:00', '::', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', '02:00:00:00:00:00'], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', '02:00:00:00:00:00'], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', ''], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', ''], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', ''], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:cccc::2', '01:02:03:04:05:06'], ['33:33:ff:00:00:02', '02:00:00:00:00:00', 'aaaa:bbbb:cccc::2', 'ff02::1:ff00:2', 'aaaa:bbbb:dddd::2', '02:00:00:00:00:00']] dev0 seen NA: [] Skip test case: Assume kernel did not have the required patches for proxyarp (IPv6) SKIP proxyarp_open_ebtables_ipv6 6.450568 2022-10-08 10:57:07.433760 passed all 0 test case(s) skipped 1 test case(s) 2022-10-08 10:57:07 ./run-tests.py radius_acct_non_ascii_ssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START radius_acct_non_ascii_ssid 1/1 Test: RADIUS Accounting and non-ASCII SSID Starting AP wlan3 Connect STA wlan0 to AP PASS radius_acct_non_ascii_ssid 1.096533 2022-10-08 10:57:08.985179 passed all 1 test case(s) 2022-10-08 10:57:09 ./run-tests.py sae_no_ffc_by_default DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_no_ffc_by_default 1/1 Test: SAE and default groups rejecting FFC Starting AP wlan3 Connect STA wlan0 to AP PASS sae_no_ffc_by_default 1.128943 2022-10-08 10:57:10.562593 passed all 1 test case(s) 2022-10-08 10:57:10 ./run-tests.py sae_pwe_group_25 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_group_25 1/1 Test: SAE PWE derivation options with group 25 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_group_25 1.964929 2022-10-08 10:57:12.975519 passed all 1 test case(s) 2022-10-08 10:57:13 ./run-tests.py scan_and_bss_entry_removed DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_and_bss_entry_removed 1/1 Test: Last scan result and connect work processing on BSS entry update Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan5 to AP Connect STA wlan0 to AP Connect STA wlan5 to AP PASS scan_and_bss_entry_removed 5.392393 2022-10-08 10:57:18.820064 passed all 1 test case(s) 2022-10-08 10:57:18 ./run-tests.py scan_freq_list DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_freq_list 1/1 Test: Scan with SET freq_list and scan_cur_freq Starting AP wlan3 Connect STA wlan0 to AP PASS scan_freq_list 1.295335 2022-10-08 10:57:20.554825 passed all 1 test case(s) 2022-10-08 10:57:20 ./run-tests.py scan_hidden DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_hidden 1/1 Test: Control interface behavior on scan parameters Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS scan_hidden 1.525358 2022-10-08 10:57:22.523054 passed all 1 test case(s) 2022-10-08 10:57:22 ./run-tests.py sigma_dut_ap_ocv DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_ocv 1/1 Test: sigma_dut controlled AP using OCV Skip test case: sigma_dut not available SKIP sigma_dut_ap_ocv 0.213701 2022-10-08 10:57:23.178316 passed all 0 test case(s) skipped 1 test case(s) 2022-10-08 10:57:23 ./run-tests.py sigma_dut_dpp_qr_resp_4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_resp_4 1/1 Test: sigma_dut DPP/QR responder (conf index 4) Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_resp_4 0.136587 2022-10-08 10:57:23.756932 passed all 0 test case(s) skipped 1 test case(s) 2022-10-08 10:57:23 ./run-tests.py sigma_dut_dpp_qr_resp_chan_list DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_dpp_qr_resp_chan_list 1/1 Test: sigma_dut DPP/QR responder (channel list override) Skip test case: sigma_dut not available SKIP sigma_dut_dpp_qr_resp_chan_list 0.139797 2022-10-08 10:57:24.340973 passed all 0 test case(s) skipped 1 test case(s) 2022-10-08 10:57:24 ./run-tests.py wep_shared_key_auth_multi_key DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wep_shared_key_auth_multi_key 1/1 Test: WEP Shared Key authentication with multiple keys Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS wep_shared_key_auth_multi_key 2.655199 2022-10-08 10:57:27.438910 passed all 1 test case(s) 2022-10-08 10:57:27 ./run-tests.py wnm_ess_disassoc_imminent_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_ess_disassoc_imminent_pmf 1/1 Test: WNM ESS Disassociation Imminent Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_ess_disassoc_imminent_pmf 1.204749 2022-10-08 10:57:29.085033 passed all 1 test case(s) 2022-10-08 10:57:29 ./run-tests.py wpa2_ocv_sta_override_sa_query_resp DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_sta_override_sa_query_resp 1/1 Test: OCV on 2.4 GHz and STA override SA Query Response Starting AP wlan3 Connect STA wlan0 to AP PASS wpa2_ocv_sta_override_sa_query_resp 1.136635 2022-10-08 10:57:30.664242 passed all 1 test case(s) 2022-10-08 10:57:30 ./run-tests.py wpa2_ocv_vht40 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_vht40 1/1 Test: OCV with VHT40 channel Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS wpa2_ocv_vht40 13.724651 2022-10-08 10:57:44.832956 passed all 1 test case(s) 2022-10-08 10:57:44 ./run-tests.py wpas_ap_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_5ghz 1/1 Test: wpa_supplicant AP mode - 5 GHz Connect STA wlan1 to AP Wi-Fi Generation: 6 ['RSSI=-27', 'LINKSPEED=6', 'NOISE=9999', 'FREQUENCY=5180', 'WIDTH=20 MHz', 'CENTER_FRQ1=5180', 'AVG_RSSI=-27', 'AVG_BEACON_RSSI=-27'] PASS wpas_ap_5ghz 1.645659 2022-10-08 10:57:46.918102 passed all 1 test case(s) 2022-10-08 10:57:46 ./run-tests.py wpas_ap_invalid_frequency DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_invalid_frequency 1/1 Test: wpa_supplicant AP mode - invalid frequency configuration PASS wpas_ap_invalid_frequency 1.144486 2022-10-08 10:57:48.514941 passed all 1 test case(s) 2022-10-08 10:57:48 ./run-tests.py wpas_ctrl_dump DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_dump 1/1 Test: wpa_supplicant ctrl_iface and DUMP/GET global parameters Config values from DUMP: {'ctrl_interface': 'DIR=/var/run/wpa_supplicant GROUP=adm', 'ctrl_interface_group': 'null', 'eapol_version': '1', 'ap_scan': '1', 'user_mpm': '1', 'max_peer_links': '99', 'mesh_max_inactivity': '300', 'mesh_fwding': '1', 'dot11RSNASAERetransPeriod': '1000', 'disable_scan_offload': '0', 'fast_reauth': '1', 'opensc_engine_path': 'null', 'pkcs11_engine_path': 'null', 'pkcs11_module_path': 'null', 'openssl_ciphers': 'null', 'pcsc_reader': 'null', 'pcsc_pin': 'null', 'external_sim': '0', 'driver_param': 'null', 'dot11RSNAConfigPMKLifetime': '0', 'dot11RSNAConfigPMKReauthThreshold': '0', 'dot11RSNAConfigSATimeout': '0', 'update_config': '0', 'auto_uuid': '0', 'device_name': 'Device A', 'manufacturer': 'null', 'model_name': 'null', 'model_number': 'null', 'serial_number': 'null', 'config_methods': 'null', 'wps_cred_processing': '0', 'wps_cred_add_sae': '0', 'p2p_listen_reg_class': '0', 'p2p_listen_channel': '0', 'p2p_oper_reg_class': '0', 'p2p_oper_channel': '0', 'p2p_go_intent': '7', 'p2p_ssid_postfix': 'null', 'persistent_reconnect': '0', 'p2p_intra_bss': '1', 'p2p_group_idle': '0', 'p2p_go_freq_change_policy': '2', 'p2p_passphrase_len': '0', 'p2p_add_cli_chan': '0', 'p2p_optimize_listen_chan': '0', 'p2p_go_ht40': '0', 'p2p_go_vht': '0', 'p2p_go_he': '0', 'p2p_go_edmg': '0', 'p2p_disabled': '0', 'p2p_go_ctwindow': '0', 'p2p_no_group_iface': '1', 'p2p_ignore_shared_freq': '0', 'ip_addr_go': '0.0.0.0', 'ip_addr_mask': '0.0.0.0', 'ip_addr_start': '0.0.0.0', 'ip_addr_end': '0.0.0.0', 'p2p_cli_probe': '0', 'p2p_device_random_mac_addr': '0', 'p2p_interface_random_mac_addr': '0', 'p2p_6ghz_disable': '0', 'bss_max_count': '200', 'bss_expiration_age': '180', 'bss_expiration_scan_count': '2', 'filter_ssids': '0', 'filter_rssi': '0', 'max_num_sta': '128', 'ap_isolate': '0', 'disassoc_low_ack': '0', 'hs20': '1', 'interworking': '1', 'access_network_type': '15', 'go_interworking': '0', 'go_access_network_type': '0', 'go_internet': '0', 'go_venue_group': '0', 'go_venue_type': '0', 'pbc_in_m1': '0', 'autoscan': 'null', 'wps_nfc_dev_pw_id': '0', 'ext_password_backend': 'test:psk1=12345678', 'p2p_go_max_inactivity': '300', 'auto_interworking': '0', 'okc': '0', 'pmf': '0', 'sae_pwe': '0', 'sae_pmkid_in_assoc': '0', 'dtim_period': '0', 'beacon_int': '0', 'ignore_old_scan_res': '0', 'scan_cur_freq': '0', 'scan_res_valid_for_connect': '5', 'sched_scan_interval': '0', 'sched_scan_start_delay': '0', 'tdls_external_control': '0', 'osu_dir': 'null', 'wowlan_triggers': 'null', 'p2p_search_delay': '500', 'mac_addr': '0', 'rand_addr_lifetime': '60', 'preassoc_mac_addr': '0', 'key_mgmt_offload': '1', 'passive_scan': '0', 'reassoc_same_bss_optim': '0', 'wps_priority': '0', 'fst_group_id': 'null', 'fst_priority': '0', 'fst_llt': '0', 'cert_in_cb': '1', 'wpa_rsc_relaxation': '1', 'sched_scan_plans': 'null', 'non_pref_chan': 'null', 'mbo_cell_capa': '3', 'disassoc_imminent_rssi_threshold': '-75', 'oce': '1', 'gas_address3': '0', 'ftm_responder': '0', 'ftm_initiator': '0', 'gas_rand_addr_lifetime': '60', 'gas_rand_mac_addr': '0', 'dpp_config_processing': '0', 'dpp_name': 'null', 'dpp_mud_url': 'null', 'coloc_intf_reporting': '0', 'disable_btm': '0', 'extended_key_id': '0', 'wowlan_disconnect_on_deinit': '0', 'force_kdk_derivation': '0', 'pasn_corrupt_mic': '0'} PASS wpas_ctrl_dump 0.163394 2022-10-08 10:57:49.123810 passed all 1 test case(s) 2022-10-08 10:57:49 ./run-tests.py wpas_ctrl_nfc_report_handover DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_nfc_report_handover 1/1 Test: wpa_supplicant ctrl_iface NFC_REPORT_HANDOVER PASS wpas_ctrl_nfc_report_handover 0.146252 2022-10-08 10:57:49.722994 passed all 1 test case(s) 2022-10-08 10:57:49 ./run-tests.py wpas_ctrl_set_sched_scan_relative_rssi DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ctrl_set_sched_scan_relative_rssi 1/1 Test: wpa_supplicant SET relative RSSI PASS wpas_ctrl_set_sched_scan_relative_rssi 0.146462 2022-10-08 10:57:50.322261 passed all 1 test case(s) 2022-10-08 10:57:50 ./run-tests.py wpas_mesh_dynamic_interface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_mesh_dynamic_interface 1/1 Test: wpa_supplicant mesh with dynamic interface mesh0 address 42:00:00:00:00:00 mesh-wlan1-0 address 42:00:00:00:01:00 Make sure another dynamic group can be added mesh0 address 42:00:00:00:00:00 mesh-wlan1-1 address 42:00:00:00:01:00 PASS wpas_mesh_dynamic_interface 2.084907 2022-10-08 10:57:52.855693 passed all 1 test case(s) 2022-10-08 10:57:52 ./run-tests.py wps_ext_m1_invalid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_m1_invalid 1/1 Test: WPS proto: M1 failing parsing Starting AP wlan3 PASS wps_ext_m1_invalid 1.216866 2022-10-08 10:57:54.521364 passed all 1 test case(s) 2022-10-08 10:57:54 ./run-tests.py wps_ext_m3_missing_e_hash2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_m3_missing_e_hash2 1/1 Test: WPS proto: M3 missing E-Hash2 Starting AP wlan3 PASS wps_ext_m3_missing_e_hash2 1.211492 2022-10-08 10:57:56.186112 passed all 1 test case(s) 2022-10-08 10:57:56 ./stop.sh