2022-12-28 02:27:12 export USER=root 2022-12-28 02:27:12 ./build.sh Building TNC testing tools Building wlantest Building hs20-osu-client osu_client.c: In function ‘cmd_osu_select’: osu_client.c:2090:44: warning: ‘%s’ directive output may be truncated writing up to 985 bytes into a region of size 4 [-Wformat-truncation=] 2090 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 14); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~ osu_client.c:2090:4: note: ‘snprintf’ output between 1 and 986 bytes into a destination of size 4 2090 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 14); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2103:44: warning: ‘%s’ directive output may be truncated writing up to 994 bytes into a region of size 4 [-Wformat-truncation=] 2103 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 5); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~ osu_client.c:2103:4: note: ‘snprintf’ output between 1 and 995 bytes into a destination of size 4 2103 | snprintf(txt->lang, sizeof(txt->lang), "%s", buf + 5); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2077:10: warning: ‘%s’ directive output may be truncated writing up to 990 bytes into a region of size 256 [-Wformat-truncation=] 2077 | "%s", buf + 9); | ^~ In file included from ../../src/utils/common.h:12, from osu_client.c:16: ../../src/utils/os.h:552:21: note: ‘snprintf’ output between 1 and 991 bytes into a destination of size 256 552 | #define os_snprintf snprintf osu_client.c:2076:4: note: in expansion of macro ‘os_snprintf’ 2076 | os_snprintf(last->osu_nai2, sizeof(last->osu_nai2), | ^~~~~~~~~~~ osu_client.c:2071:10: warning: ‘%s’ directive output may be truncated writing up to 991 bytes into a region of size 256 [-Wformat-truncation=] 2071 | "%s", buf + 8); | ^~ In file included from ../../src/utils/common.h:12, from osu_client.c:16: ../../src/utils/os.h:552:21: note: ‘snprintf’ output between 1 and 992 bytes into a destination of size 256 552 | #define os_snprintf snprintf osu_client.c:2070:4: note: in expansion of macro ‘os_snprintf’ 2070 | os_snprintf(last->osu_nai, sizeof(last->osu_nai), | ^~~~~~~~~~~ osu_client.c:2065:7: warning: ‘%s’ directive output may be truncated writing up to 989 bytes into a region of size 33 [-Wformat-truncation=] 2064 | snprintf(last->osu_ssid2, sizeof(last->osu_ssid2), | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2065 | "%s", buf + 10); | ~^~~~~~~~~~~~~~ osu_client.c:2064:4: note: ‘snprintf’ output between 1 and 990 bytes into a destination of size 33 2064 | snprintf(last->osu_ssid2, sizeof(last->osu_ssid2), | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2065 | "%s", buf + 10); | ~~~~~~~~~~~~~~~ osu_client.c:2059:7: warning: ‘%s’ directive output may be truncated writing up to 990 bytes into a region of size 33 [-Wformat-truncation=] 2058 | snprintf(last->osu_ssid, sizeof(last->osu_ssid), | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2059 | "%s", buf + 9); | ~^~~~~~~~~~~~~ osu_client.c:2058:4: note: ‘snprintf’ output between 1 and 991 bytes into a destination of size 33 2058 | snprintf(last->osu_ssid, sizeof(last->osu_ssid), | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2059 | "%s", buf + 9); | ~~~~~~~~~~~~~~ osu_client.c:2048:44: warning: ‘%s’ directive output may be truncated writing up to 995 bytes into a region of size 256 [-Wformat-truncation=] 2048 | snprintf(last->url, sizeof(last->url), "%s", buf + 4); | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~ osu_client.c:2048:4: note: ‘snprintf’ output between 1 and 996 bytes into a destination of size 256 2048 | snprintf(last->url, sizeof(last->url), "%s", buf + 4); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ osu_client.c:2040:48: warning: ‘%s’ directive output may be truncated writing up to 986 bytes into a region of size 20 [-Wformat-truncation=] 2040 | snprintf(last->bssid, sizeof(last->bssid), "%s", | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~ 2041 | buf + 13); | ~~~~~~~~~ osu_client.c:2040:4: note: ‘snprintf’ output between 1 and 987 bytes into a destination of size 20 2040 | snprintf(last->bssid, sizeof(last->bssid), "%s", | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 2041 | buf + 13); | ~~~~~~~~~ Building hostapd Building wpa_supplicant 2022-12-28 02:28:00 ./start.sh 2022-12-28 02:28:01 ./run-tests.py ap_bss_add_out_of_memory DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_bss_add_out_of_memory 1/1 Test: Running out of memory while adding a BSS Starting AP wlan4 Starting BSS phy=phy3 ifname=wlan3 Starting BSS phy=phy3 ifname=wlan3-2 Removing BSS wlan3-2 Removing BSS wlan3 PASS ap_bss_add_out_of_memory 1.752885 2022-12-28 02:28:04.758881 passed all 1 test case(s) 2022-12-28 02:28:04 ./run-tests.py ap_cipher_bip_gmac_256 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_cipher_bip_gmac_256 1/1 Test: WPA2-PSK with BIP-GMAC-256 Starting AP wlan3 Connect STA wlan0 to AP PASS ap_cipher_bip_gmac_256 1.263698 2022-12-28 02:28:06.522914 passed all 1 test case(s) 2022-12-28 02:28:06 ./run-tests.py ap_enable_disable_reenable DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_enable_disable_reenable 1/1 Test: Enable, disable, re-enable AP Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_enable_disable_reenable 2.244705 2022-12-28 02:28:09.270895 passed all 1 test case(s) 2022-12-28 02:28:09 ./run-tests.py ap_fragmentation_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_fragmentation_open 1/1 Test: Open AP with fragmentation threshold Starting AP wlan3 Connect STA wlan0 to AP PASS ap_fragmentation_open 1.459239 2022-12-28 02:28:11.230005 passed all 1 test case(s) 2022-12-28 02:28:11 ./run-tests.py ap_ft_pmf_beacon_prot DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_pmf_beacon_prot 1/1 Test: WPA2-PSK-FT AP with PMF and beacon protection Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_pmf_beacon_prot 2.696715 2022-12-28 02:28:14.411083 passed all 1 test case(s) 2022-12-28 02:28:14 ./run-tests.py ap_ft_ptk_rekey DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_ptk_rekey 1/1 Test: WPA2-PSK-FT PTK rekeying triggered by station after roam Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_ptk_rekey 2.742695 2022-12-28 02:28:17.621790 passed all 1 test case(s) 2022-12-28 02:28:17 ./run-tests.py ap_ft_sae_h2e_and_loop DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ft_sae_h2e_and_loop 1/1 Test: WPA2-PSK-FT-SAE AP (AP H2E, STA loop) Starting AP wlan3 Starting AP wlan4 Connect to first AP Connect STA wlan0 to AP Roam to the second AP Roam back to the first AP PASS ap_ft_sae_h2e_and_loop 2.461752 2022-12-28 02:28:20.554259 passed all 1 test case(s) 2022-12-28 02:28:20 ./run-tests.py ap_hs20_anqp_format_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_anqp_format_errors 1/1 Test: Interworking network selection and ANQP format errors Starting AP wlan3 PASS ap_hs20_anqp_format_errors 3.261802 2022-12-28 02:28:24.285902 passed all 1 test case(s) 2022-12-28 02:28:24 ./run-tests.py ap_hs20_auto_interworking_global_pmf DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_auto_interworking_global_pmf 1/1 Test: Hotspot 2.0 connection with auto_interworking=1 and pmf=2 Starting AP wlan3 PASS ap_hs20_auto_interworking_global_pmf 5.342255 2022-12-28 02:28:30.099043 passed all 1 test case(s) 2022-12-28 02:28:30 ./run-tests.py ap_hs20_deauth_req_from_radius DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_deauth_req_from_radius 1/1 Test: Hotspot 2.0 connection and deauthentication request from RADIUS Starting AP wlan3 PASS ap_hs20_deauth_req_from_radius 3.177969 2022-12-28 02:28:33.739257 passed all 1 test case(s) 2022-12-28 02:28:33 ./run-tests.py ap_hs20_domain_suffix_match_full DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_domain_suffix_match_full 1/1 Test: Hotspot 2.0 and domain_suffix_match Starting AP wlan3 PASS ap_hs20_domain_suffix_match_full 1.625986 2022-12-28 02:28:35.836444 passed all 1 test case(s) 2022-12-28 02:28:35 ./run-tests.py ap_hs20_eap_fast_gtc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_eap_fast_gtc 1/1 Test: Hotspot 2.0 connection with FAST/EAP-GTC Starting AP wlan3 PASS ap_hs20_eap_fast_gtc 1.327703 2022-12-28 02:28:37.633559 passed all 1 test case(s) 2022-12-28 02:28:37 ./run-tests.py ap_hs20_gas_while_associated DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_hs20_gas_while_associated 1/1 Test: Hotspot 2.0 connection with GAS query while associated Starting AP wlan3 Verifying GAS query while associated PASS ap_hs20_gas_while_associated 1.185311 2022-12-28 02:28:39.287859 passed all 1 test case(s) 2022-12-28 02:28:39 ./run-tests.py ap_ht40_plus_minus2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_plus_minus2 1/1 Test: HT40 with both plus and minus allowed (2) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_ht40_plus_minus2 2.764964 2022-12-28 02:28:42.520147 passed all 1 test case(s) 2022-12-28 02:28:42 ./run-tests.py ap_ht40_scan DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht40_scan 1/1 Test: HT40 co-ex scan Starting AP wlan3 hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy3', 'freq': '2432', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '0', 'num_sta_no_short_preamble': '0', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '0', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x0', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '5', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '-1', 'ieee80211n': '1', 'ieee80211ac': '0', 'ieee80211ax': '0', 'ieee80211be': '0', 'beacon_int': '100', 'dtim_period': '2', 'ht_caps_info': '000e', 'ht_mcs_bitmask': 'ffff0000000000000000', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'max_txpower': '20', 'bss[0]': 'wlan3', 'bssid[0]': '02:00:00:00:03:00', 'ssid[0]': 'test-ht40', 'num_sta[0]': '0'} Connect STA wlan0 to AP hostapd STA: {'addr': '02:00:00:00:00:00', 'flags': '[AUTH][ASSOC][AUTHORIZED][SHORT_PREAMBLE][WMM][HT]', 'aid': '1', 'capability': '0x421', 'listen_interval': '5', 'supported_rates': '02 04 0b 16 0c 12 18 24 30 48 60 6c', 'timeout_next': 'NULLFUNC POLL', 'rx_packets': '2', 'tx_packets': '2', 'rx_bytes': '128', 'tx_bytes': '169', 'inactive_msec': '92', 'signal': '-30', 'rx_rate_info': '0', 'tx_rate_info': '10', 'ht_mcs_bitmask': 'ffff0000000000000000', 'connected_time': '0', 'supp_op_classes': '5451525354737475767778797a7b7c7d7e7f808182', 'ht_caps_info': '0x107e', 'ext_capab': '04004a8201404040000120'} STA SIGNAL_POLL: RSSI=-30 LINKSPEED=1 NOISE=-92 FREQUENCY=2432 WIDTH=40 MHz CENTER_FRQ1=2422 AVG_RSSI=-30 AVG_BEACON_RSSI=-30 PASS ap_ht40_scan 2.798627 2022-12-28 02:28:45.787439 passed all 1 test case(s) 2022-12-28 02:28:45 ./run-tests.py ap_ht_stbc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_ht_stbc 1/1 Test: HT STBC overrides Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP Connect STA wlan2 to AP PASS ap_ht_stbc 1.936811 2022-12-28 02:28:48.200932 passed all 1 test case(s) 2022-12-28 02:28:48 ./run-tests.py ap_invalid_config DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_invalid_config 1/1 Test: Try to start AP with invalid configuration and fix configuration Trying to start AP wlan3 with invalid configuration Starting AP wlan3 Fix configuration and start AP again Connect STA wlan0 to AP PASS ap_invalid_config 1.221945 2022-12-28 02:28:49.902858 passed all 1 test case(s) 2022-12-28 02:28:49 ./run-tests.py ap_qosmap_default DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_qosmap_default 1/1 Test: QoS mapping with default values Starting AP wlan3 Connect STA wlan0 to AP PASS ap_qosmap_default 1.934963 2022-12-28 02:28:52.316037 passed all 1 test case(s) 2022-12-28 02:28:52 ./run-tests.py ap_tdls_prohibit DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_tdls_prohibit 1/1 Test: Open AP and TDLS prohibited Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS ap_tdls_prohibit 1.527204 2022-12-28 02:28:54.322515 passed all 1 test case(s) 2022-12-28 02:28:54 ./run-tests.py ap_vht160_no_dfs_100_plus DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_vht160_no_dfs_100_plus 1/1 Test: VHT with 160 MHz channel width and no DFS (100 plus) Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS ap_vht160_no_dfs_100_plus 1.798629 2022-12-28 02:28:56.598854 passed all 1 test case(s) 2022-12-28 02:28:56 ./run-tests.py ap_wpa2_eap_aka_prime_ext DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_aka_prime_ext 1/1 Test: EAP-AKA' with external UMTS auth to hit Synchronization-Failure Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_aka_prime_ext 1.083498 2022-12-28 02:28:58.158594 passed all 1 test case(s) 2022-12-28 02:28:58 ./run-tests.py ap_wpa2_eap_sim_db DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_sim_db 1/1 Test: EAP-SIM DB error cases Starting AP wlan3 Connect STA wlan0 to AP No proper response - wait for pending eap_sim_db request timeout PASS ap_wpa2_eap_sim_db 2.74934 2022-12-28 02:29:01.382105 passed all 1 test case(s) 2022-12-28 02:29:01 ./run-tests.py ap_wpa2_eap_tls_ocsp_ca_signed_unknown DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_eap_tls_ocsp_ca_signed_unknown 1/1 Test: EAP-TLS and CA signed OCSP response (unknown) openssl ocsp -reqout logs/current/ocsp-req.der -issuer auth_serv/ca.pem -sha256 -serial 0xD8D3E3A6CBE3CD73 -no_nonce openssl result: openssl ocsp -index auth_serv/index-unknown.txt -rsigner auth_serv/ca.pem -rkey auth_serv/ca-key.pem -CA auth_serv/ca.pem -ndays 7 -reqin logs/current/ocsp-req.der -resp_no_certs -respout logs/current/ocsp-resp-ca-signed-unknown.der openssl result: Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_eap_tls_ocsp_ca_signed_unknown 1.039453 2022-12-28 02:29:02.900961 passed all 1 test case(s) 2022-12-28 02:29:02 ./run-tests.py ap_wpa2_psk_ext_eapol_retry1c DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ext_eapol_retry1c 1/1 Test: WPA2 4-way handshake with EAPOL-Key 1/4 and 2/4 retransmitted and SNonce changing Starting AP wlan3 Connect STA wlan0 to AP Send EAPOL-Key msg 2/4 (a) Send EAPOL-Key msg 2/4 (b) Send EAPOL-Key msg 4/4 PASS ap_wpa2_psk_ext_eapol_retry1c 1.158695 2022-12-28 02:29:04.537292 passed all 1 test case(s) 2022-12-28 02:29:04 ./run-tests.py ap_wpa2_psk_ext_key_id_ptk_rekey_sta2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_ext_key_id_ptk_rekey_sta2 1/1 Test: Extended Key ID and PTK rekey by station (start with Key ID 1) Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_ext_key_id_ptk_rekey_sta2 2.208608 2022-12-28 02:29:07.227230 passed all 1 test case(s) 2022-12-28 02:29:07 ./run-tests.py ap_wpa2_psk_supp_proto_no_igtk DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wpa2_psk_supp_proto_no_igtk 1/1 Test: WPA2-PSK supplicant protocol testing: no IGTK KDE Starting AP wlan3 Connect STA wlan0 to AP PASS ap_wpa2_psk_supp_proto_no_igtk 2.036993 2022-12-28 02:29:09.746024 passed all 1 test case(s) 2022-12-28 02:29:09 ./run-tests.py ap_wps_conf_5ghz DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_conf_5ghz 1/1 Test: WPS PBC provisioning with configured AP on 5 GHz band Starting AP wlan3 WPS provisioning step Country code at the end: 00 PASS ap_wps_conf_5ghz 2.04058 2022-12-28 02:29:12.266630 passed all 1 test case(s) 2022-12-28 02:29:12 ./run-tests.py ap_wps_eap_wsc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_eap_wsc 1/1 Test: WPS and EAP-WSC in network profile Starting AP wlan3 Unexpected identity Connect STA wlan0 to AP No phase1 parameter Connect STA wlan0 to AP No PIN/PBC in phase1 Connect STA wlan0 to AP Invalid pkhash in phase1 Connect STA wlan0 to AP Zero fragment_size Connect STA wlan0 to AP Missing new_auth Connect STA wlan0 to AP Missing new_encr Connect STA wlan0 to AP Missing new_key Connect STA wlan0 to AP PASS ap_wps_eap_wsc 3.967151 2022-12-28 02:29:16.710111 passed all 1 test case(s) 2022-12-28 02:29:16 ./run-tests.py ap_wps_er_http_proto_invalid_sid_uuid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_er_http_proto_invalid_sid_uuid 1/1 Test: WPS ER HTTP protocol testing - invalid SID UUID HTTP server received: GET /foo.xml HTTP/1.1 HTTP header: Cache-Control: no-cache HTTP header: Pragma: no-cache HTTP header: Accept: text/xml, application/xml HTTP header: User-Agent: wpa_supplicant HTTP header: Host: 127.0.0.1:12345 HTTP server received: POST /wps_control HTTP/1.1 HTTP header: Host: 127.0.0.1:12345 HTTP header: Content-Type: text/xml; charset="utf-8" HTTP header: Content-Length: 280 HTTP header: SOAPACTION: "urn:schemas-wifialliance-org:service:WFAWLANConfig:1#GetDeviceInfo" HTTP server received: SUBSCRIBE /wps_event HTTP/1.1 HTTP header: HOST: 127.0.0.1:12345 HTTP header: CALLBACK: HTTP header: NT: upnp:event HTTP header: TIMEOUT: Second-1800 Event URL: http://127.0.0.1:49152/event/102484439/1 PASS ap_wps_er_http_proto_invalid_sid_uuid 0.136082 2022-12-28 02:29:17.316763 passed all 1 test case(s) 2022-12-28 02:29:17 ./run-tests.py ap_wps_m2_missing_msg_type DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_m2_missing_msg_type 1/1 Test: WPS and M2 without Message Type Starting AP wlan3 PASS ap_wps_m2_missing_msg_type 1.278624 2022-12-28 02:29:19.068093 passed all 1 test case(s) 2022-12-28 02:29:19 ./run-tests.py ap_wps_priority DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_priority 1/1 Test: WPS PIN provisioning with configured AP and wps_priority Starting AP wlan3 WPS provisioning step PASS ap_wps_priority 1.901077 2022-12-28 02:29:21.438248 passed all 1 test case(s) 2022-12-28 02:29:21 ./run-tests.py ap_wps_probe_req_ie_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_probe_req_ie_oom 1/1 Test: WPS ProbeReq IE OOM Starting AP wlan3 PASS ap_wps_probe_req_ie_oom 1.937386 2022-12-28 02:29:23.846000 passed all 1 test case(s) 2022-12-28 02:29:23 ./run-tests.py ap_wps_reg_config_and_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ap_wps_reg_config_and_sae 1/1 Test: WPS registrar configuring an AP using AP PIN and using PSK+SAE Starting AP wlan3 WPS configuration step Connect STA wlan1 to AP PASS ap_wps_reg_config_and_sae 2.295814 2022-12-28 02:29:26.605448 passed all 1 test case(s) 2022-12-28 02:29:26 ./run-tests.py authsrv_errors_1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START authsrv_errors_1 1/1 Test: Authentication server errors (1) Starting AP wlan4 PASS authsrv_errors_1 0.318921 2022-12-28 02:29:27.392916 passed all 1 test case(s) 2022-12-28 02:29:27 ./run-tests.py authsrv_unknown_client DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START authsrv_unknown_client 1/1 Test: Authentication server and unknown user Starting AP wlan4 Starting AP wlan3 Connect STA wlan0 to AP PASS authsrv_unknown_client 1.436623 2022-12-28 02:29:29.299152 passed all 1 test case(s) 2022-12-28 02:29:29 ./run-tests.py autogo_join_auto_go_neg_after_seeing_go DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_join_auto_go_neg_after_seeing_go 1/1 Test: P2P_CONNECT-auto fallback to GO Neg after seeing GO Start autonomous GO wlan0 wlan0: Trying to discover peer 02:00:00:00:01:00 PASS autogo_join_auto_go_neg_after_seeing_go 8.071078 2022-12-28 02:29:37.843033 passed all 1 test case(s) 2022-12-28 02:29:37 ./run-tests.py autogo_remove_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START autogo_remove_iface 1/1 Test: P2P autonomous GO and interface being removed Start autonomous GO wlan5 PASS autogo_remove_iface 2.046877 2022-12-28 02:29:40.357910 passed all 1 test case(s) 2022-12-28 02:29:40 ./run-tests.py dbus_scan_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_scan_oom 1/1 Test: D-Bus scan method and OOM PASS dbus_scan_oom 0.137291 2022-12-28 02:29:40.963975 passed all 1 test case(s) 2022-12-28 02:29:41 ./run-tests.py dbus_wps_pbc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dbus_wps_pbc 1/1 Test: D-Bus WPS/PBC operation and signals Starting AP wlan3 PASS dbus_wps_pbc 6.108383 2022-12-28 02:29:47.540277 passed all 1 test case(s) 2022-12-28 02:29:47 ./run-tests.py dpp_akm_sha512 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_akm_sha512 1/1 Test: DPP AKM (SHA512) Starting AP wlan3 Connect STA wlan0 to AP PASS dpp_akm_sha512 1.228123 2022-12-28 02:29:49.239591 passed all 1 test case(s) 2022-12-28 02:29:49 ./run-tests.py dpp_nfc_errors_hostapd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_nfc_errors_hostapd 1/1 Test: DPP NFC operation failures in hostapd Starting AP wlan3 PASS dpp_nfc_errors_hostapd 0.603038 2022-12-28 02:29:50.311363 passed all 1 test case(s) 2022-12-28 02:29:50 ./run-tests.py dpp_qr_code_auth_initiator_either_3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_auth_initiator_either_3 1/1 Test: DPP QR Code and authentication exchange (Initiator in either role) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_auth_initiator_either_3 2.239365 2022-12-28 02:29:53.021125 passed all 1 test case(s) 2022-12-28 02:29:53 ./run-tests.py dpp_qr_code_auth_responder_configurator_group_id DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_auth_responder_configurator_group_id 1/1 Test: DPP QR Code and responder as the configurator with group_id) PASS dpp_qr_code_auth_responder_configurator_group_id 2.280815 2022-12-28 02:29:55.772609 passed all 1 test case(s) 2022-12-28 02:29:55 ./run-tests.py dpp_qr_code_chan_list_unicast DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_chan_list_unicast 1/1 Test: DPP QR Code and 2.4 GHz channels (unicast) dev0 displays QR Code dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_chan_list_unicast 1.433133 2022-12-28 02:29:57.674297 passed all 1 test case(s) 2022-12-28 02:29:57 ./run-tests.py dpp_qr_code_listen_continue DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_qr_code_listen_continue 1/1 Test: DPP QR Code and listen operation needing continuation dev0 displays QR Code Wait for listen to expire and get restarted dev1 scans QR Code and initiates DPP Authentication PASS dpp_qr_code_listen_continue 5.708497 2022-12-28 02:30:03.849615 passed all 1 test case(s) 2022-12-28 02:30:03 ./run-tests.py dpp_tcp_qr_code_config_event_initiator DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START dpp_tcp_qr_code_config_event_initiator 1/1 Test: DPP over TCP (Configurator initiates with config event) PASS dpp_tcp_qr_code_config_event_initiator 0.66283 2022-12-28 02:30:04.983553 passed all 1 test case(s) 2022-12-28 02:30:05 ./run-tests.py eap_proto_aka_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_aka_errors 1/1 Test: EAP-AKA protocol tests (error paths) Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Starting AP wlan4 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS eap_proto_aka_errors 7.912521 2022-12-28 02:30:13.361671 passed all 1 test case(s) 2022-12-28 02:30:13 ./run-tests.py eap_proto_tls DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_proto_tls 1/1 Test: EAP-TLS protocol tests Starting AP wlan3 Running connection iteration 1 Connect STA wlan0 to AP tls_handler - RX 0276000d01746c732075736572 Test: Too much payload in TLS/Start: TLS Message Length (0 bytes) smaller than this fragment (1 bytes) Running connection iteration 2 Connect STA wlan0 to AP tls_handler - RX 027c000d01746c732075736572 Test: Fragmented TLS/Start tls_handler - RX 020300060d00 Test: Too long fragment of TLS/Start: Invalid reassembly state: tls_in_left=2 tls_in_len=0 in_len=0 Running connection iteration 3 Connect STA wlan0 to AP tls_handler - RX 02ee000d01746c732075736572 Test: EAP-Failure Running connection iteration 4 Connect STA wlan0 to AP tls_handler - RX 020d000d01746c732075736572 Test: TLS/Start tls_handler - RX 020600be0d0016030100b3010000af0303213c91923d06fd9e4641cbd5018e5c98217a38f0b4a871829ecc33910317617f000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f00ff0100004e000b000403000102000a000c000a001d0017001e001900180016000000170000000d002a0028040305030603080708080809080a080b080408050806040105010601030303010302040205020602 Test: Fragmented TLS message tls_handler - RX 020700060d00 Test: Invalid TLS message: no Flags octet included + workaround tls_handler - RX 020800060d00 Test: Too long fragment of TLS message: more data than TLS message length indicated tls_handler - RX 020900060d00 Test: EAP-Failure Running connection iteration 5 Connect STA wlan0 to AP tls_handler - RX 0206000d01746c732075736572 Test: Fragmented TLS/Start and truncated Message Length field Running connection iteration 6 Connect STA wlan0 to AP tls_handler - RX 0242000d01746c732075736572 Test: TLS/Start tls_handler - RX 020c00c20d0016030100b7010000b30303a024353ad411ead4bd6bbd03b1e371515357f4d0ff40b9d84ecd1a82cdfbeced000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f00ff01000052000b000403000102000a000c000a001d0017001e00190018002300000016000000170000000d002a0028040305030603080708080809080a080b080408050806040105010601030303010302040205020602 Test: Fragmented TLS message tls_handler - RX 020d00060d00 Test: Invalid TLS message: no Flags octet included + workaround disabled Running connection iteration 7 Connect STA wlan0 to AP tls_handler - RX 02b2000d01746c732075736572 Test: TLS/Start tls_handler - RX 020f00be0d0016030100b3010000af03030b28d5cb15e78af86e0965376bccf8f51ee84c1406673e48c03b3068ee418395000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f00ff0100004e000b000403000102000a000c000a001d0017001e001900180016000000170000000d002a0028040305030603080708080809080a080b080408050806040105010601030303010302040205020602 Test: Fragmented TLS message (long; first) tls_handler - RX 021000060d00 Test: Fragmented TLS message (long; cont 0) tls_handler - RX 021100060d00 Test: Fragmented TLS message (long; cont 1) tls_handler - RX 021200060d00 Test: Fragmented TLS message (long; cont 2) tls_handler - RX 021300060d00 Test: Fragmented TLS message (long; cont 3) tls_handler - RX 021400060d00 Test: Fragmented TLS message (long; cont 4) tls_handler - RX 021500060d00 Test: Fragmented TLS message (long; cont 5) tls_handler - RX 021600060d00 Test: Fragmented TLS message (long; cont 6) tls_handler - RX 021700060d00 Test: Fragmented TLS message (long; cont 7) tls_handler - RX 021800060d00 Test: Fragmented TLS message (long; cont 8) tls_handler - RX 021900060d00 Test: Fragmented TLS message (long; cont 9) tls_handler - RX 021a00060d00 Test: Fragmented TLS message (long; cont 10) tls_handler - RX 021b00060d00 Test: Fragmented TLS message (long; cont 11) tls_handler - RX 021c00060d00 Test: Fragmented TLS message (long; cont 12) tls_handler - RX 021d00060d00 Test: Fragmented TLS message (long; cont 13) tls_handler - RX 021e00060d00 Test: Fragmented TLS message (long; cont 14) tls_handler - RX 021f00060d00 Test: Fragmented TLS message (long; cont 15) tls_handler - RX 022000060d00 Test: Fragmented TLS message (long; cont 16) tls_handler - RX 022100060d00 Test: Fragmented TLS message (long; cont 17) tls_handler - RX 022200060d00 Test: Fragmented TLS message (long; cont 18) tls_handler - RX 022300060d00 Test: Fragmented TLS message (long; cont 19) tls_handler - RX 022400060d00 Test: Fragmented TLS message (long; cont 20) tls_handler - RX 022500060d00 Test: Fragmented TLS message (long; cont 21) tls_handler - RX 022600060d00 Test: Fragmented TLS message (long; cont 22) tls_handler - RX 022700060d00 Test: Fragmented TLS message (long; cont 23) tls_handler - RX 022800060d00 Test: Fragmented TLS message (long; cont 24) tls_handler - RX 022900060d00 Test: Fragmented TLS message (long; cont 25) tls_handler - RX 022a00060d00 Test: Fragmented TLS message (long; cont 26) tls_handler - RX 022b00060d00 Test: Fragmented TLS message (long; cont 27) tls_handler - RX 022c00060d00 Test: Fragmented TLS message (long; cont 28) tls_handler - RX 022d00060d00 Test: Fragmented TLS message (long; cont 29) tls_handler - RX 022e00060d00 Test: Fragmented TLS message (long; cont 30) tls_handler - RX 022f00060d00 Test: Fragmented TLS message (long; cont 31) tls_handler - RX 023000060d00 Test: Fragmented TLS message (long; cont 32) tls_handler - RX 023100060d00 Test: Fragmented TLS message (long; cont 33) tls_handler - RX 023200060d00 Test: Fragmented TLS message (long; cont 34) tls_handler - RX 023300060d00 Test: Fragmented TLS message (long; cont 35) tls_handler - RX 023400060d00 Test: Fragmented TLS message (long; cont 36) tls_handler - RX 023500060d00 Test: Fragmented TLS message (long; cont 37) tls_handler - RX 023600060d00 Test: Fragmented TLS message (long; cont 38) tls_handler - RX 023700060d00 Test: Fragmented TLS message (long; cont 39) tls_handler - RX 023800060d00 Test: Fragmented TLS message (long; cont 40) tls_handler - RX 023900060d00 Test: Fragmented TLS message (long; cont 41) tls_handler - RX 023a00060d00 Test: Fragmented TLS message (long; cont 42) tls_handler - RX 023b00060d00 Test: Fragmented TLS message (long; cont 43) tls_handler - RX 023c00060d00 Test: EAP-Failure Running connection iteration 8 Connect STA wlan0 to AP tls_handler - RX 02f7000d01746c732075736572 Test: TLS/Start tls_handler - RX 023e006e0dc0000000b816030100b3010000af03034377a2395cf61f8eb2ac8de316613c2e6e451ae49aed55c2bec131800946f92a000038c02cc030009fcca9cca8ccaac02bc02f009ec024c028006bc023c0270067c00ac0140039c009c0130033009d009c003d003c0035002f Test: Non-ACK to more-fragment message tls_handler - RX 023f00060d00 Test: EAP-Failure Running connection iteration 9 Connect STA wlan0 to AP tls_handler - RX 027a000d01746c732075736572 No more test responses available - test case completed PASS eap_proto_tls 4.814293 2022-12-28 02:30:18.643936 passed all 1 test case(s) 2022-12-28 02:30:18 ./run-tests.py eap_teap_basic_password_auth_pac_no_inner_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_basic_password_auth_pac_no_inner_eap 1/1 Test: EAP-TEAP with Basic-Password-Auth and PAC without inner auth Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_basic_password_auth_pac_no_inner_eap 1.470554 2022-12-28 02:30:20.596196 passed all 1 test case(s) 2022-12-28 02:30:20 ./run-tests.py eap_teap_eap_mschapv2_pac_no_inner_eap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_teap_eap_mschapv2_pac_no_inner_eap 1/1 Test: EAP-TEAP with inner EAP-MSCHAPv2 and PAC without inner EAP Starting AP wlan3 Connect STA wlan0 to AP PASS eap_teap_eap_mschapv2_pac_no_inner_eap 1.186735 2022-12-28 02:30:22.265597 passed all 1 test case(s) 2022-12-28 02:30:22 ./run-tests.py eap_tls_sha384 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START eap_tls_sha384 1/1 Test: EAP-TLS with SHA384 signature Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan1 to AP PASS eap_tls_sha384 1.613078 2022-12-28 02:30:24.347790 passed all 1 test case(s) 2022-12-28 02:30:24 ./run-tests.py fils_offload_to_driver DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_offload_to_driver 1/1 Test: FILS offload to driver Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_offload_to_driver 1.970213 2022-12-28 02:30:26.787207 passed all 1 test case(s) 2022-12-28 02:30:26 ./run-tests.py fils_sk_erp_followed_by_pmksa_caching DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fils_sk_erp_followed_by_pmksa_caching 1/1 Test: FILS SK ERP following by PMKSA caching Starting AP as-erp Starting AP wlan3 (old add_ap argument type) Connect STA wlan0 to AP PASS fils_sk_erp_followed_by_pmksa_caching 1.845054 2022-12-28 02:30:29.102065 passed all 1 test case(s) 2022-12-28 02:30:29 ./run-tests.py fst_ap_ack_request_with_no_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_ack_request_with_no_session 1/1 Test: FST AP ack request with no session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Frame was ignored (Ack request) PASS fst_ap_ack_request_with_no_session 7.643797 2022-12-28 02:30:37.214809 passed all 1 test case(s) 2022-12-28 02:30:37 ./run-tests.py fst_ap_ack_response_with_no_session DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_ack_response_with_no_session 1/1 Test: FST AP ack response with no session Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Frame was ignored (Ack response) PASS fst_ap_ack_response_with_no_session 7.542436 2022-12-28 02:30:45.227505 passed all 1 test case(s) 2022-12-28 02:30:45 ./run-tests.py fst_ap_initiate_session_no_new_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_ap_initiate_session_no_new_iface 1/1 Test: FST AP initiate session - no new iface Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP Success. Bad parameter was detected (No new_iface was set) PASS fst_ap_initiate_session_no_new_iface 2.527295 2022-12-28 02:30:48.225474 passed all 1 test case(s) 2022-12-28 02:30:48 ./run-tests.py fst_disconnect_1_of_2_stas_from_non_fst_ap DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_disconnect_1_of_2_stas_from_non_fst_ap 1/1 Test: FST disconnect 1 of 2 STAs from non-FST AP Starting AP wlan3 (old add_ap argument type) Starting AP wlan4 (old add_ap argument type) Starting AP wlan7 (old add_ap argument type) Connect STA wlan5 to AP Connect STA wlan6 to AP PASS fst_disconnect_1_of_2_stas_from_non_fst_ap 7.014979 2022-12-28 02:30:55.709287 passed all 1 test case(s) 2022-12-28 02:30:55 ./run-tests.py fst_setup_mbie_diff DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START fst_setup_mbie_diff 1/1 Test: FST setup and different MBIE in FST Setup Request Starting AP wlan3 Starting AP wlan4 Connect STA wlan5 to AP Connect STA wlan6 to AP PASS fst_setup_mbie_diff 2.867278 2022-12-28 02:30:59.045295 passed all 1 test case(s) 2022-12-28 02:30:59 ./run-tests.py gas_anqp_get_oom DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_get_oom 1/1 Test: GAS/ANQP query OOM Starting AP wlan3 PASS gas_anqp_get_oom 0.713916 2022-12-28 02:31:00.229985 passed all 1 test case(s) 2022-12-28 02:31:00 ./run-tests.py gas_anqp_hs20_proto DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_hs20_proto 1/1 Test: GAS/ANQP and Hotspot 2.0 element protocol testing Starting AP wlan3 PASS gas_anqp_hs20_proto 0.922187 2022-12-28 02:31:01.622908 passed all 1 test case(s) 2022-12-28 02:31:01 ./run-tests.py gas_anqp_oom_hapd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_anqp_oom_hapd 1/1 Test: GAS/ANQP query and OOM in hostapd Starting AP wlan3 PASS gas_anqp_oom_hapd 2.876587 2022-12-28 02:31:04.968431 passed all 1 test case(s) 2022-12-28 02:31:05 ./run-tests.py gas_fragment_with_comeback_delay DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START gas_fragment_with_comeback_delay 1/1 Test: GAS fragmentation and comeback delay Starting AP wlan3 PASS gas_fragment_with_comeback_delay 1.228907 2022-12-28 02:31:06.668074 passed all 1 test case(s) 2022-12-28 02:31:06 ./run-tests.py grpform_pbc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START grpform_pbc 1/1 Test: P2P group formation using PBC and re-init GO Negotiation Start GO negotiation wlan0 -> wlan1 wlan0: Trying to discover peer 02:00:00:00:01:00 wlan1: Trying to discover peer 02:00:00:00:00:00 Group formed PASS grpform_pbc 4.298237 2022-12-28 02:31:11.431441 passed all 1 test case(s) 2022-12-28 02:31:11 ./run-tests.py hapd_ctrl_ext_io_errors DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START hapd_ctrl_ext_io_errors 1/1 Test: hostapd and external I/O errors Starting AP wlan3 PASS hapd_ctrl_ext_io_errors 0.621567 2022-12-28 02:31:12.522008 passed all 1 test case(s) 2022-12-28 02:31:12 ./run-tests.py he_40_fallback_to_20 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_40_fallback_to_20 1/1 Test: HE and 40 MHz channel configuration falling back to 20 MHz Starting AP wlan3 Connect STA wlan0 to AP Country code at the end: 00 PASS he_40_fallback_to_20 1.830051 2022-12-28 02:31:14.818537 passed all 1 test case(s) 2022-12-28 02:31:14 ./run-tests.py he_capab_parsing DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_capab_parsing 1/1 Test: HE AP and capability parsing Starting AP wlan3 PASS he_capab_parsing 0.726964 2022-12-28 02:31:16.017107 passed all 1 test case(s) 2022-12-28 02:31:16 ./run-tests.py he_tkip DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START he_tkip 1/1 Test: HE and TKIP Starting AP wlan3 Connect STA wlan0 to AP hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy3', 'freq': '5180', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '1', 'num_sta_no_short_preamble': '1', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '1', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x13', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '36', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '0', 'ieee80211n': '0', 'ieee80211ac': '0', 'ieee80211ax': '0', 'ieee80211be': '0', 'beacon_int': '100', 'dtim_period': '2', 'supported_rates': '0c 12 18 24 30 48 60 6c', 'max_txpower': '23', 'bss[0]': 'wlan3', 'bssid[0]': '02:00:00:00:03:00', 'ssid[0]': 'he', 'num_sta[0]': '1'} Country code at the end: 00 PASS he_tkip 2.369244 2022-12-28 02:31:18.854783 passed all 1 test case(s) 2022-12-28 02:31:18 ./run-tests.py ibss_wpa_none DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START ibss_wpa_none 1/1 Test: IBSS WPA-None Start IBSS on the first STA wlan0 waiting for IBSS start/join to complete Waiting for real BSSID on the first STA wlan0 waiting for IBSS start/join to complete Join two STAs to the IBSS wlan1 waiting for IBSS start/join to complete STA0 BSSID fe:8d:47:84:22:5f differs from STA1 BSSID 00:00:00:00:00:00 wlan1 waiting for IBSS start/join to complete wlan2 waiting for IBSS start/join to complete STA0 BSSID fe:8d:47:84:22:5f differs from STA2 BSSID 00:00:00:00:00:00 wlan2 waiting for IBSS start/join to complete bssid0=fe:8d:47:84:22:5f bssid1=fe:8d:47:84:22:5f bssid2=fe:8d:47:84:22:5f Ignoring known connectivity failure: dev1->dev2 unicast data delivery failed Ignoring known connectivity failure: dev1->dev2 unicast data delivery failed Ignoring known connectivity failure: dev1->dev2 unicast data delivery failed PASS ibss_wpa_none 25.677088 2022-12-28 02:31:45.007928 passed all 1 test case(s) 2022-12-28 02:31:45 ./run-tests.py kernel_bss_leak_deauth DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START kernel_bss_leak_deauth 1/1 Test: cfg80211/mac80211 BSS leak on deauthentication Starting AP wlan3 Connect STA wlan0 to AP PASS kernel_bss_leak_deauth 1.02431 2022-12-28 02:31:46.498323 passed all 1 test case(s) 2022-12-28 02:31:46 ./run-tests.py macsec_psk_br3 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_br3 1/1 Test: MACsec PSK (bridge; 3 devices) ip link: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000 link/ether 64:00:6a:30:91:ac brd ff:ff:ff:ff:ff:ff altname enp0s31f6 3: wlan0: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 4: wlan1: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:01:00 brd ff:ff:ff:ff:ff:ff 5: wlan2: mtu 1500 qdisc mq state DOWN mode DORMANT group default qlen 1000 link/ether 02:00:00:00:02:00 brd ff:ff:ff:ff:ff:ff 6: wlan3: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:03:00 brd ff:ff:ff:ff:ff:ff 7: wlan4: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:04:00 brd ff:ff:ff:ff:ff:ff 8: wlan5: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:05:00 brd ff:ff:ff:ff:ff:ff 9: wlan6: mtu 1500 qdisc mq state DOWN mode DEFAULT group default qlen 1000 link/ether 02:00:00:00:06:00 brd ff:ff:ff:ff:ff:ff 10: hwsim0: mtu 1500 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/ieee802.11/radiotap 12:00:00:00:00:00 brd ff:ff:ff:ff:ff:ff 14: brveth: mtu 1500 qdisc noqueue state UP mode DEFAULT group default qlen 1000 link/ether 92:e5:43:67:9b:c6 brd ff:ff:ff:ff:ff:ff 15: vethbr0@veth0: mtu 1500 qdisc noqueue master brveth state LOWERLAYERDOWN mode DEFAULT group default qlen 1000 link/ether b2:1b:4a:d2:b9:b9 brd ff:ff:ff:ff:ff:ff 16: veth0@vethbr0: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 7e:b6:13:e2:f2:8e brd ff:ff:ff:ff:ff:ff 17: vethbr1@veth1: mtu 1500 qdisc noqueue master brveth state LOWERLAYERDOWN mode DEFAULT group default qlen 1000 link/ether 82:7c:98:eb:59:6b brd ff:ff:ff:ff:ff:ff 18: veth1@vethbr1: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 96:3a:10:bb:8c:45 brd ff:ff:ff:ff:ff:ff 19: vethbr2@veth2: mtu 1500 qdisc noqueue master brveth state LOWERLAYERDOWN mode DEFAULT group default qlen 1000 link/ether 4e:44:a2:0d:29:66 brd ff:ff:ff:ff:ff:ff 20: veth2@vethbr2: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 1a:9b:93:4d:33:64 brd ff:ff:ff:ff:ff:ff Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_br3 0.796874 2022-12-28 02:31:47.763720 passed all 0 test case(s) skipped 1 test case(s) 2022-12-28 02:31:47 ./run-tests.py macsec_psk_mka_life_time DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START macsec_psk_mka_life_time 1/1 Test: MACsec PSK - MKA life time Skip test case: macsec supported (wpa_supplicant CONFIG_MACSEC, CONFIG_DRIVER_MACSEC_LINUX; kernel CONFIG_MACSEC) SKIP macsec_psk_mka_life_time 0.245298 2022-12-28 02:31:48.485378 passed all 0 test case(s) skipped 1 test case(s) 2022-12-28 02:31:48 ./run-tests.py mbo_assoc_disallow_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mbo_assoc_disallow_change 1/1 Test: MBO and dynamic association disallowed change with passive scanning Starting AP wlan3 Connect STA wlan0 to AP PASS mbo_assoc_disallow_change 1.397864 2022-12-28 02:31:50.385504 passed all 1 test case(s) 2022-12-28 02:31:50 ./run-tests.py mesh_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_failure 1/1 Test: Mesh and local failures PASS mesh_failure 3.355753 2022-12-28 02:31:54.220961 passed all 1 test case(s) 2022-12-28 02:31:54 ./run-tests.py mesh_open_no_auto2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_open_no_auto2 1/1 Test: Open mesh network connectivity, no_auto on both peers PASS mesh_open_no_auto2 1.582981 2022-12-28 02:31:56.273111 passed all 1 test case(s) 2022-12-28 02:31:56 ./run-tests.py mesh_secure_ocv_mix_ht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mesh_secure_ocv_mix_ht 1/1 Test: Mesh network with a VHT STA and a HT STA under OCV Country code at the end: 00 PASS mesh_secure_ocv_mix_ht 2.627849 2022-12-28 02:31:59.369023 passed all 1 test case(s) 2022-12-28 02:31:59 ./run-tests.py mscs_without_ap_support DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START mscs_without_ap_support 1/1 Test: MSCS without AP support Starting AP wlan3 Connect STA wlan0 to AP PASS mscs_without_ap_support 1.109573 2022-12-28 02:32:00.952103 passed all 1 test case(s) 2022-12-28 02:32:00 ./run-tests.py multi_ap_wps_shared DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START multi_ap_wps_shared 1/1 Test: WPS on shared fronthaul/backhaul AP Starting AP wlan3 PASS multi_ap_wps_shared 18.361357 2022-12-28 02:32:19.783272 passed all 1 test case(s) 2022-12-28 02:32:19 ./run-tests.py p2p_channel_5ghz_165_169_us DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2p_channel_5ghz_165_169_us 1/1 Test: P2P GO and 5 GHz channels 165 (allowed) and 169 (disallowed) in US Country code at the end: 00 PASS p2p_channel_5ghz_165_169_us 1.018303 2022-12-28 02:32:21.271745 passed all 1 test case(s) 2022-12-28 02:32:21 ./run-tests.py p2ps_connect_adv_go_p2ps_method_group_iface DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_connect_adv_go_p2ps_method_group_iface 1/1 Test: P2PS auto-accept connection with advertisement as GO and P2PS method using separate group interface PASS p2ps_connect_adv_go_p2ps_method_group_iface 12.613017 2022-12-28 02:32:34.362148 passed all 1 test case(s) 2022-12-28 02:32:34 ./run-tests.py p2ps_wildcard_p2ps DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START p2ps_wildcard_p2ps 1/1 Test: P2PS wildcard SD Probe Request/Response PASS p2ps_wildcard_p2ps 2.809911 2022-12-28 02:32:37.642993 passed all 1 test case(s) 2022-12-28 02:32:37 ./run-tests.py pasn_comeback_after_0_sae DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_comeback_after_0_sae 1/1 Test: PASN authentication with SAE, with comeback flow where comeback after is set to 0 Starting AP wlan3 Connect STA wlan0 to AP sta: TK: 4afe25471a8aa77b0d464d84aefa40e9 KDK: ap : TK: 4afe25471a8aa77b0d464d84aefa40e9 KDK: sta: TK: 22b15b9d935ef4f33274f4a63279f6e1 KDK: ap : TK: 22b15b9d935ef4f33274f4a63279f6e1 KDK: PASS pasn_comeback_after_0_sae 5.020585 2022-12-28 02:32:43.136847 passed all 1 test case(s) 2022-12-28 02:32:43 ./run-tests.py pasn_sae_while_connected_same_channel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_sae_while_connected_same_channel 1/1 Test: PASN SAE authentication while connected same channel Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 Connect STA wlan0 to AP flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2412 -30 [WPA2-PSK-CCMP][ESS] test-pasn-wpa2-psk 02:00:00:00:04:00 2412 -30 [WPA2-SAE-CCMP][SAE-H2E][ESS] test-pasn-sae sta: TK: 7a2e4b502b6f796373452a32b9ff5eba KDK: ap : TK: 7a2e4b502b6f796373452a32b9ff5eba KDK: PASS pasn_sae_while_connected_same_channel 2.703994 2022-12-28 02:32:46.310995 passed all 1 test case(s) 2022-12-28 02:32:46 ./run-tests.py pasn_while_connected_same_channel DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START pasn_while_connected_same_channel 1/1 Test: PASN authentication with WPA2/CCMP AP while connected same channel Starting AP wlan3 Connect STA wlan0 to AP Starting AP wlan4 flush_scan_cache: Could not clear all BSS entries. These remain: bssid / frequency / signal level / flags / ssid 02:00:00:00:03:00 2412 -30 [WPA2-PSK-CCMP][ESS] test-wpa2-psk 02:00:00:00:04:00 2412 -30 [WPA2-PSK-CCMP][ESS] test-wpa2-pasn sta: TK: d394b714b61c5b025fb48da7aa144435 KDK: ap : TK: d394b714b61c5b025fb48da7aa144435 KDK: PASS pasn_while_connected_same_channel 2.53721 2022-12-28 02:32:49.317511 passed all 1 test case(s) 2022-12-28 02:32:49 ./run-tests.py sae_ocv_pmk_failure DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_ocv_pmk_failure 1/1 Test: SAE with OCV and fetching PMK (failed 4-way handshake) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_ocv_pmk_failure 5.165052 2022-12-28 02:32:54.951475 passed all 1 test case(s) 2022-12-28 02:32:54 ./run-tests.py sae_pk_and_psk_invalid_password DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pk_and_psk_invalid_password 1/1 Test: SAE-PK and PSK using invalid password combination Starting AP wlan3 PASS sae_pk_and_psk_invalid_password 0.234987 2022-12-28 02:32:55.659731 passed all 1 test case(s) 2022-12-28 02:32:55 ./run-tests.py sae_pmksa_caching_pmkid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pmksa_caching_pmkid 1/1 Test: SAE and PMKSA caching (PMKID in AssocReq after SAE) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_pmksa_caching_pmkid 1.420006 2022-12-28 02:32:57.551523 passed all 1 test case(s) 2022-12-28 02:32:57 ./run-tests.py sae_pwe_group_2 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_pwe_group_2 1/1 Test: SAE PWE derivation options with group 2 Starting AP wlan3 Connect STA wlan0 to AP Connect STA wlan0 to AP Connect STA wlan0 to AP PASS sae_pwe_group_2 1.82421 2022-12-28 02:32:59.844692 passed all 1 test case(s) 2022-12-28 02:32:59 ./run-tests.py sae_reflection_attack_ffc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sae_reflection_attack_ffc 1/1 Test: SAE reflection attack (FFC) Starting AP wlan3 Connect STA wlan0 to AP PASS sae_reflection_attack_ffc 1.269567 2022-12-28 02:33:01.585300 passed all 1 test case(s) 2022-12-28 02:33:01 ./run-tests.py scan_multi_bssid_4 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_multi_bssid_4 1/1 Test: Scan and Multiple BSSID element (3) Starting AP wlan3 AP 02:00:00:00:03:01: {'id': '76', 'bssid': '02:00:00:00:03:01', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0401', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1672194782582556', 'age': '0', 'ie': '000b7472616e736d6974746564010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00472502000a53020100000131550101000a53020100000132550102000a53020100000133550103', 'flags': '[ESS]', 'ssid': 'transmitted', 'snr': '59', 'est_throughput': '65000', 'update_idx': '146', 'beacon_ie': '000b7472616e736d6974746564010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00472502000a53020100000131550101000a53020100000132550102000a53020100000133550103'} AP 02:00:00:00:03:02: {'id': '77', 'bssid': '02:00:00:00:03:02', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0001', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1672194782582556', 'age': '0', 'ie': '000131010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550101', 'flags': '[ESS]', 'ssid': '1', 'snr': '59', 'est_throughput': '65000', 'update_idx': '146', 'beacon_ie': '000131010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550101'} AP 02:00:00:00:03:03: {'id': '78', 'bssid': '02:00:00:00:03:03', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0001', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1672194782582556', 'age': '0', 'ie': '000132010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550102', 'flags': '[ESS]', 'ssid': '2', 'snr': '59', 'est_throughput': '65000', 'update_idx': '146', 'beacon_ie': '000132010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550102'} AP 02:00:00:00:03:00: {'id': '79', 'bssid': '02:00:00:00:03:00', 'freq': '2412', 'beacon_int': '100', 'capabilities': '0x0001', 'qual': '0', 'noise': '-89', 'level': '-30', 'tsf': '1672194782582556', 'age': '0', 'ie': '000133010882848b960c1218240301012a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550103', 'flags': '[ESS]', 'ssid': '3', 'snr': '59', 'est_throughput': '65000', 'update_idx': '146', 'beacon_ie': '000133010882848b960c1218240301010504010200002a010432043048606c3b0251002d1a0c001bffff0000000000000000000001000000000000000000003d16010000000000000000000000000000000000000000007f080400400200000040dd180050f2020101010003a4000027a4000042435e0062322f00550103'} PASS scan_multi_bssid_4 1.263004 2022-12-28 02:33:03.316195 passed all 1 test case(s) 2022-12-28 02:33:03 ./run-tests.py scan_only DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_only 1/1 Test: Control interface behavior on scan parameters with type=only Starting AP wlan3 Full scan Limited channel scan Passive single-channel scan Active single-channel scan Active single-channel scan on AP's operating channel PASS scan_only 9.042952 2022-12-28 02:33:12.832632 passed all 1 test case(s) 2022-12-28 02:33:12 ./run-tests.py scan_specific_bssid DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START scan_specific_bssid 1/1 Test: Scan for a specific BSSID Starting AP wlan3 PASS scan_specific_bssid 1.104166 2022-12-28 02:33:14.416538 passed all 1 test case(s) 2022-12-28 02:33:14 ./run-tests.py sigma_dut_ap_osen DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_osen 1/1 Test: sigma_dut controlled AP with OSEN Skip test case: sigma_dut not available SKIP sigma_dut_ap_osen 0.179042 2022-12-28 02:33:15.073681 passed all 0 test case(s) skipped 1 test case(s) 2022-12-28 02:33:15 ./run-tests.py sigma_dut_ap_sae_h2e_anti_clogging DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_sae_h2e_anti_clogging 1/1 Test: sigma_dut controlled AP with SAE H2E and anti-clogging token Skip test case: sigma_dut not available SKIP sigma_dut_ap_sae_h2e_anti_clogging 0.177269 2022-12-28 02:33:15.729860 passed all 0 test case(s) skipped 1 test case(s) 2022-12-28 02:33:15 ./run-tests.py sigma_dut_ap_transition_disable_change DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_ap_transition_disable_change 1/1 Test: sigma_dut controlled AP and transition disabled indication change Skip test case: sigma_dut not available SKIP sigma_dut_ap_transition_disable_change 0.178856 2022-12-28 02:33:16.387644 passed all 0 test case(s) skipped 1 test case(s) 2022-12-28 02:33:16 ./run-tests.py sigma_dut_open DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sigma_dut_open 1/1 Test: sigma_dut controlled open network association Skip test case: sigma_dut not available SKIP sigma_dut_open 0.131258 2022-12-28 02:33:16.997489 passed all 0 test case(s) skipped 1 test case(s) 2022-12-28 02:33:17 ./run-tests.py sta_dynamic_random_mac_addr_scan_keep_oui DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START sta_dynamic_random_mac_addr_scan_keep_oui 1/1 Test: Dynamically added wpa_supplicant interface and random MAC address for scan (keep OUI) Starting AP wlan3 Connect STA wlan5 to AP PASS sta_dynamic_random_mac_addr_scan_keep_oui 1.590852 2022-12-28 02:33:19.068088 passed all 1 test case(s) 2022-12-28 02:33:19 ./run-tests.py tspec_reassoc DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START tspec_reassoc 1/1 Test: Reassociation to same BSS while having tspecs Starting AP wlan3 Connect STA wlan0 to AP PASS tspec_reassoc 5.619465 2022-12-28 02:33:25.163695 passed all 1 test case(s) 2022-12-28 02:33:25 ./run-tests.py wep_ht_vht DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wep_ht_vht 1/1 Test: WEP and HT/VHT Starting AP wlan3 Connect STA wlan0 to AP hostapd STATUS: {'state': 'ENABLED', 'phy': 'phy3', 'freq': '5180', 'num_sta_non_erp': '0', 'num_sta_no_short_slot_time': '1', 'num_sta_no_short_preamble': '1', 'olbc': '0', 'num_sta_ht_no_gf': '0', 'num_sta_no_ht': '1', 'num_sta_ht_20_mhz': '0', 'num_sta_ht40_intolerant': '0', 'olbc_ht': '0', 'ht_op_mode': '0x13', 'cac_time_seconds': '0', 'cac_time_left_seconds': 'N/A', 'channel': '36', 'edmg_enable': '0', 'edmg_channel': '0', 'secondary_channel': '0', 'ieee80211n': '0', 'ieee80211ac': '0', 'ieee80211ax': '0', 'ieee80211be': '0', 'beacon_int': '100', 'dtim_period': '2', 'supported_rates': '0c 12 18 24 30 48 60 6c', 'max_txpower': '23', 'bss[0]': 'wlan3', 'bssid[0]': '02:00:00:00:03:00', 'ssid[0]': 'test-vht40-wep', 'num_sta[0]': '1'} Country code at the end: 00 PASS wep_ht_vht 1.976372 2022-12-28 02:33:27.621255 passed all 1 test case(s) 2022-12-28 02:33:27 ./run-tests.py wmediumd_path_ttl DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wmediumd_path_ttl 1/1 Test: Mesh path request TTL PASS wmediumd_path_ttl 10.384548 2022-12-28 02:33:38.479831 passed all 1 test case(s) 2022-12-28 02:33:38 ./run-tests.py wnm_bss_tm_connect_cmd DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_connect_cmd 1/1 Test: WNM BSS Transition Management and cfg80211 connect command Starting AP wlan3 Starting AP wlan4 Connect STA wlan5 to AP Preferred Candidate List (matching neighbor for another BSS) without Disassociation Imminent PASS wnm_bss_tm_connect_cmd 2.192608 2022-12-28 02:33:41.150317 passed all 1 test case(s) 2022-12-28 02:33:41 ./run-tests.py wnm_bss_tm_req_with_mbo_ie DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wnm_bss_tm_req_with_mbo_ie 1/1 Test: WNM BSS transition request with MBO IE and reassociation delay attribute Starting AP wlan3 Connect STA wlan0 to AP PASS wnm_bss_tm_req_with_mbo_ie 7.300197 2022-12-28 02:33:48.928287 passed all 1 test case(s) 2022-12-28 02:33:48 ./run-tests.py wpa2_ocv_ap_override_eapol_g1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpa2_ocv_ap_override_eapol_g1 1/1 Test: OCV on 2.4 GHz and AP override EAPOL-Key group msg 1/2 Starting AP wlan3 Connect STA wlan0 to AP PASS wpa2_ocv_ap_override_eapol_g1 1.061869 2022-12-28 02:33:50.468881 passed all 1 test case(s) 2022-12-28 02:33:50 ./run-tests.py wpas_ap_dfs DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_ap_dfs 1/1 Test: wpa_supplicant AP mode - DFS Connect STA wlan1 to AP PASS wpas_ap_dfs 67.508377 2022-12-28 02:34:58.456329 passed all 1 test case(s) 2022-12-28 02:34:58 ./run-tests.py wpas_mesh_password_mismatch DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wpas_mesh_password_mismatch 1/1 Test: Mesh network and one device with mismatching password PASS wpas_mesh_password_mismatch 22.006329 2022-12-28 02:35:20.934063 passed all 1 test case(s) 2022-12-28 02:35:20 ./run-tests.py wps_ext_cred_proto_missing_cred DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_cred_proto_missing_cred 1/1 Test: WPS and Credential: Missing Credential Starting AP wlan3 PASS wps_ext_cred_proto_missing_cred 1.163035 2022-12-28 02:35:22.570676 passed all 1 test case(s) 2022-12-28 02:35:22 ./run-tests.py wps_ext_m2_ack DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_m2_ack 1/1 Test: WPS proto: M2 followed by ACK Starting AP wlan3 PASS wps_ext_m2_ack 1.171146 2022-12-28 02:35:24.210852 passed all 1 test case(s) 2022-12-28 02:35:24 ./run-tests.py wps_ext_proto_m4_missing_r_snonce1 DEV: wlan0: 02:00:00:00:00:00 DEV: wlan1: 02:00:00:00:01:00 DEV: wlan2: 02:00:00:00:02:00 APDEV: wlan3 APDEV: wlan4 START wps_ext_proto_m4_missing_r_snonce1 1/1 Test: WPS and no R-SNonce1 in M4 Starting AP wlan3 PASS wps_ext_proto_m4_missing_r_snonce1 1.169466 2022-12-28 02:35:25.852273 passed all 1 test case(s) 2022-12-28 02:35:25 ./stop.sh